INFO: task kworker/0:1:11 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df845d84 r8:00000002 r7:60000013 r6:df845d8c r5:83240000 r4:83240000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83240000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df845e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83240000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb09000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579238c r4:85792000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579238c r4:830b8580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240000 r8:830b85ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8580 r8:8027ed34 r7:df83de60 r6:830b8680 r5:83240000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf845fb0 to 0xdf845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830b7900 INFO: task kworker/0:1:11 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b3513000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/0:0:3092 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3092 tgid:3092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9d5d84 r8:00000002 r7:60000013 r6:df9d5d8c r5:839f8000 r4:839f8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:839f8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:839f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebda3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85793b8c r4:85793800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85793b8c r4:830b8480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839f8000 r8:830b84ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:8027ed34 r7:df911e60 r6:8473a100 r5:839f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499ca00 INFO: task kworker/0:0:3092 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b378b000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/0:6:3126 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9e1d84 r8:00000002 r7:60000013 r6:df9e1d8c r5:8400bc00 r4:8400bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8400bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8400bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb33000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579278c r4:85792400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579278c r4:830b8700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8400bc00 r8:830b872c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8700 r8:8027ed34 r7:df98de60 r6:832a1180 r5:8400bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84987b80 INFO: task kworker/0:6:3126 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b3ba1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/0:7:3128 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9fdd84 r8:00000002 r7:60000013 r6:df9fdd8c r5:8400d400 r4:8400d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8400d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474bf00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8400d400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac11000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bef8c r4:852bec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852bef8c r4:83971a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8400d400 r8:83971a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:83971a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83971a00 r8:8027ed34 r7:df9e1e60 r6:8473d000 r5:8400d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84987b80 INFO: task kworker/0:7:3128 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b3ba1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/1:12:3140 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:83a08000 r4:83a08000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a08000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b74540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a08000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac39000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a438c r4:852a4000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a438c r4:8473d580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a08000 r8:8473d5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473d580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d580 r8:8027ed34 r7:dfa21e60 r6:8473d600 r5:83a08000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84983e80 INFO: task kworker/1:12:3140 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b3f4a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/1:13:3142 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:83a0d400 r4:83a0d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a0d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e1040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a0d400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac0f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844b8b8c r4:844b8800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844b8b8c r4:8473d680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a0d400 r8:8473d6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473d680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d680 r8:8027ed34 r7:dfa2de60 r6:8473d700 r5:83a0d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777080 INFO: task kworker/1:13:3142 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b42bd000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/1:14:3143 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:83a0b000 r4:83a0b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a0b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525e240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a0b000 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514f78c r4:8514f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514f78c r4:8473d780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a0b000 r8:8473d7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473d780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d780 r8:8027ed34 r7:dfa35e60 r6:8473d800 r5:83a0b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777080 INFO: task kworker/1:14:3143 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b458e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/1:15:3146 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:840f1800 r4:840f1800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b7000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcff000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e838c r4:847e8000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e838c r4:8473d880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f1800 r8:8473d8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473d880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d880 r8:8027ed34 r7:dfa35e60 r6:8473d900 r5:840f1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777300 INFO: task kworker/1:15:3146 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b4693000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/1:16:3148 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa51d84 r8:00000002 r7:60000013 r6:dfa51d8c r5:840f5400 r4:840f5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126080 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa53000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e938c r4:847e9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e938c r4:8473d980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f5400 r8:8473d9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473d980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d980 r8:8027ed34 r7:dfa49e60 r6:8473da00 r5:840f5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa51fb0 to 0xdfa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777480 INFO: task kworker/1:16:3148 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b4a09000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/1:17:3149 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:840f3000 r4:840f3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85358d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1eb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85316f8c r4:85316c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85316f8c r4:8473da80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f3000 r8:8473daac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473da80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473da80 r8:8027ed34 r7:dfa51e60 r6:8473db00 r5:840f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777700 INFO: task kworker/1:17:3149 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b5278000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3152 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:840f2400 r4:840f2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535b700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa81000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854da78c r4:854da400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854da78c r4:84206380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f2400 r8:842063ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84206380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84206380 r8:8027ed34 r7:df9e1e60 r6:8473db80 r5:840f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84987680 INFO: task kworker/0:8:3152 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b57fa000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3153 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:840f6c00 r4:840f6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85490cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541ff8c r4:8541fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541ff8c r4:8473dc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f6c00 r8:8473dc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473dc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473dc00 r8:8027ed34 r7:dfa51e60 r6:8473dc80 r5:840f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847779c0 INFO: task kworker/1:18:3153 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b5d77000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3155 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:840f0000 r4:840f0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c3ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac59000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531778c r4:85317400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8531778c r4:8473dd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f0000 r8:8473dd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473dd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473dd00 r8:8027ed34 r7:dfa51e60 r6:8473dd80 r5:840f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777d80 INFO: task kworker/1:19:3155 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b5f9a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3158 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:840f4800 r4:840f4800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560bcc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3bf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546e78c r4:8546e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546e78c r4:8473de00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f4800 r8:8473de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473de00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473de00 r8:8027ed34 r7:dfa51e60 r6:8473de80 r5:840f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777e00 INFO: task kworker/1:20:3158 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b60dc000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3160 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:840f0c00 r4:840f0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858199c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85792b8c r4:85792800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85792b8c r4:83374000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f0c00 r8:8337402c r7:82804d40 r6:dddced40 r5:dddced60 r4:83374000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83374000 r8:8027ed34 r7:df9e1e60 r6:8473df00 r5:840f0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84987e40 INFO: task kworker/0:9:3160 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b635a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3162 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:83ffa400 r4:83ffa400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffa400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85537f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ffa400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb327000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546df8c r4:8546dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546df8c r4:8473df80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffa400 r8:8473dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473df80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473df80 r8:8027ed34 r7:dfa99e60 r6:8470b000 r5:83ffa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ae0c0 INFO: task kworker/1:21:3162 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b6495000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3164 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:83ff8000 r4:83ff8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ff8000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a5b8c r4:856a5800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a5b8c r4:8470b080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff8000 r8:8470b0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b080 r8:8027ed34 r7:dfa99e60 r6:8470b100 r5:83ff8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ae340 INFO: task kworker/1:22:3164 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b68ed000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3167 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa85d84 r8:00000002 r7:60000013 r6:dfa85d8c r5:83ffe000 r4:83ffe000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffe000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7f5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ffe000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb703000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546f78c r4:8546f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546f78c r4:8470b180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffe000 r8:8470b1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b180 r8:8027ed34 r7:dfaa1e60 r6:8470b200 r5:83ffe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ae400 INFO: task kworker/1:23:3167 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b6a66000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3168 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa5dd84 r8:00000002 r7:60000013 r6:dfa5dd8c r5:83ffd400 r4:83ffd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471e780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ffd400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546fb8c r4:8546f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546fb8c r4:8470b280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffd400 r8:8470b2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b280 r8:8027ed34 r7:dfaa1e60 r6:8470b300 r5:83ffd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ae540 INFO: task kworker/1:24:3168 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b6c99000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfac5d84 r8:00000002 r7:60000113 r6:dfac5d8c r5:83ff8c00 r4:83ff8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ed600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ff8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe69000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577e78c r4:8577e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577e78c r4:8470b380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff8c00 r8:8470b3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b380 r8:8027ed34 r7:dfaa1e60 r6:8470b400 r5:83ff8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac5fb0 to 0xdfac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ae6c0 INFO: task kworker/1:25:3170 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b6cfe000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3171 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:83ff9800 r4:83ff9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aea40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ff9800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5bb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a738c r4:856a7000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a738c r4:8470b480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff9800 r8:8470b4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b480 r8:8027ed34 r7:dfac5e60 r6:8470b500 r5:83ff9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847aea40 INFO: task kworker/1:26:3171 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b6ede000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:83ffbc00 r4:83ffbc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85817980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ffbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576078c r4:85760400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576078c r4:8470b580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffbc00 r8:8470b5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b580 r8:8027ed34 r7:dfad9e60 r6:8470b600 r5:83ffbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847aeb80 INFO: task kworker/1:27:3174 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b7046000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3176 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:83ffc800 r4:83ffc800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffc800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85803000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ffc800 r7:00000000 r6:83018200 r5:00001000 r4:7f105000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f338c r4:847f3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f338c r4:8470b680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffc800 r8:8470b6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b680 r8:8027ed34 r7:dfadde60 r6:8470b700 r5:83ffc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ae9c0 INFO: task kworker/1:28:3176 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b77ac000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3178 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:840f3c00 r4:840f3c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84adf000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f101000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec955000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f078c r4:847f0400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f078c r4:8470b780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f3c00 r8:8470b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b780 r8:8027ed34 r7:dfae1e60 r6:8470b800 r5:840f3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977100 INFO: task kworker/1:29:3178 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b77ac000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3180 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:83b59800 r4:83b59800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b59800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85817840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b59800 r7:00000000 r6:83018200 r5:00001000 r4:7f103000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec971000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f1b8c r4:847f1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f1b8c r4:8470b880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b59800 r8:8470b8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b880 r8:8027ed34 r7:dfad1e60 r6:8470b900 r5:83b59800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977100 INFO: task kworker/1:30:3180 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b79e5000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3182 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:83b5bc00 r4:83b5bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b5bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b5bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ff000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85763f8c r4:85763c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85763f8c r4:8470ba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b5bc00 r8:8470ba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470ba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470ba00 r8:8027ed34 r7:dfad1e60 r6:8470ba80 r5:83b5bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977580 INFO: task kworker/1:31:3182 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b7d7c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3184 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:83b5d400 r4:83b5d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b5d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bc00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b5d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0f7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec855000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85762f8c r4:85762c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85762f8c r4:8470bb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b5d400 r8:8470bb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470bb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470bb00 r8:8027ed34 r7:dfae9e60 r6:8470bb80 r5:83b5d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849772c0 INFO: task kworker/1:32:3184 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b7f01000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3185 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:83b58000 r4:83b58000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b58000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b58000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ed000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85761b8c r4:85761800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85761b8c r4:8470bc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b58000 r8:8470bc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470bc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470bc00 r8:8027ed34 r7:dfaf1e60 r6:8470bc80 r5:83b58000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849775c0 INFO: task kworker/1:33:3185 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b7f01000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:84272400 r4:84272400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84272400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bdc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84272400 r7:00000000 r6:83018200 r5:00001000 r4:7f0fb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec895000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576378c r4:85763400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576378c r4:8470bd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84272400 r8:8470bd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470bd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470bd00 r8:8027ed34 r7:dfaf1e60 r6:83374080 r5:84272400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977880 INFO: task kworker/1:34:3188 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b863d000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3190 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:83b44800 r4:83b44800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b44800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b44800 r7:00000000 r6:83018200 r5:00001000 r4:7f0fd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec939000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85763b8c r4:85763800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85763b8c r4:8470bd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b44800 r8:8470bdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470bd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470bd80 r8:8027ed34 r7:dfb11e60 r6:8473a400 r5:83b44800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb25fb0 to 0xdfb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977c40 INFO: task kworker/1:35:3190 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b863d000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:833bec00 r4:833bec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833bec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:833bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdd5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85760f8c r4:85760c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85760f8c r4:8470be00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833bec00 r8:8470be2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470be00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470be00 r8:8027ed34 r7:dfb11e60 r6:842fd100 r5:833bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977a80 INFO: task kworker/1:36:3192 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b89a3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb31d84 r8:00000002 r7:60000013 r6:dfb31d8c r5:8323e000 r4:8323e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bd00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8323e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec87d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576338c r4:85763000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576338c r4:8470be80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:8470beac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470be80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470be80 r8:8027ed34 r7:dfb29e60 r6:84728f00 r5:8323e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977d40 INFO: task kworker/1:37:3194 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b89a3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb3dd84 r8:00000002 r7:60000113 r6:dfb3dd8c r5:84546000 r4:84546000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84546000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bb00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84546000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec839000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85762b8c r4:85762800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85762b8c r4:8470bf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84546000 r8:8470bf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470bf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470bf00 r8:8027ed34 r7:dfb29e60 r6:84728e80 r5:84546000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977d40 INFO: task kworker/1:38:3196 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b91c5000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:833ad400 r4:833ad400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833ad400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581ba00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:833ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f0f3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec827000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576278c r4:85762400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576278c r4:8470bf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833ad400 r8:8470bfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470bf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470bf80 r8:8027ed34 r7:dfb3de60 r6:84728e00 r5:833ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977e00 INFO: task kworker/1:39:3199 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b91c5000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3200 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:83adec00 r4:83adec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83adec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83adec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ef000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85761f8c r4:85761c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85761f8c r4:84758000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adec00 r8:8475802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758000 r8:8027ed34 r7:dfb4de60 r6:84728d80 r5:83adec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977e00 INFO: task kworker/1:40:3200 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b9711000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:83ae6000 r4:83ae6000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ae6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ae6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec817000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576238c r4:85762000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576238c r4:84758080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae6000 r8:847580ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758080 r8:8027ed34 r7:dfb51e60 r6:84728600 r5:83ae6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adf300 INFO: task kworker/1:41:3202 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b9711000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3204 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:83ae2400 r4:83ae2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ae2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ae2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe79000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576178c r4:85761400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576178c r4:84758100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae2400 r8:8475812c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758100 r8:8027ed34 r7:dfb51e60 r6:84758180 r5:83ae2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adf080 INFO: task kworker/1:42:3204 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ba14a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb19d84 r8:00000002 r7:60000113 r6:dfb19d8c r5:83b5b000 r4:83b5b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b5b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b5b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe55000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576138c r4:85761000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576138c r4:84758200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b5b000 r8:8475822c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758200 r8:8027ed34 r7:dfb65e60 r6:84758280 r5:83b5b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adf0c0 INFO: task kworker/1:43:3206 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ba26d000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:83ffb000 r4:83ffb000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ff140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ffb000 r7:00000000 r6:83018200 r5:00001000 r4:7f1b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7fd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85846b8c r4:85846800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85846b8c r4:84758300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffb000 r8:8475832c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758300 r8:8027ed34 r7:dfb19e60 r6:84758380 r5:83ffb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adf440 INFO: task kworker/1:44:3208 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ba912000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3211 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:839e5400 r4:839e5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:839e5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ff000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:839e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f1b1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec795000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584678c r4:85846400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584678c r4:84758400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839e5400 r8:8475842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758400 r8:8027ed34 r7:dfb05e60 r6:84758480 r5:839e5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adf7c0 INFO: task kworker/1:45:3211 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ba912000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3213 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:83b5ec00 r4:83b5ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b5ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b5ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f1fb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb1f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85846f8c r4:85846c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85846f8c r4:84758500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b5ec00 r8:8475852c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758500 r8:8027ed34 r7:dfb89e60 r6:84758580 r5:83b5ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adfa00 INFO: task kworker/1:46:3213 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ba912000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:83b58c00 r4:83b58c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b58c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475c700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b58c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2cf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb15000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f9b8c r4:847f9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f9b8c r4:84758600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b58c00 r8:8475862c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758600 r8:8027ed34 r7:dfb95e60 r6:84758680 r5:83b58c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adf700 INFO: task kworker/1:47:3214 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bb546000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3217 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:840e8000 r4:840e8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840e8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe5d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579438c r4:85794000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579438c r4:84728f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840e8000 r8:84728fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84728f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84728f80 r8:8027ed34 r7:df9e1e60 r6:84758780 r5:840e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84976ec0 INFO: task kworker/0:10:3217 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bb546000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbb9d84 r8:00000002 r7:60000013 r6:dfbb9d8c r5:840e8c00 r4:840e8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840e8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd59000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579338c r4:85793000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579338c r4:84728d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840e8c00 r8:84728d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84728d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84728d00 r8:8027ed34 r7:dfbb5e60 r6:84758700 r5:840e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84976ec0 INFO: task kworker/0:11:3218 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bbdfb000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3220 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:840ee000 r4:840ee000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840ee000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475c3c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f2d3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb27000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f938c r4:847f9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f938c r4:84758800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ee000 r8:8475882c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758800 r8:8027ed34 r7:dfb9de60 r6:847b1000 r5:840ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adfe40 INFO: task kworker/1:48:3220 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bc087000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3222 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb75d84 r8:00000002 r7:60000013 r6:dfb75d8c r5:83ae3000 r4:83ae3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ae3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475c580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ae3000 r7:00000000 r6:83018200 r5:00001000 r4:7f2d1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb1d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f978c r4:847f9400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f978c r4:84758880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae3000 r8:847588ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758880 r8:8027ed34 r7:dfb9de60 r6:847b1080 r5:83ae3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c0c0 INFO: task kworker/1:49:3222 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bc087000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3226 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:83ff0c00 r4:83ff0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475c740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ff0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2cd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb09000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f9f8c r4:847f9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f9f8c r4:84758900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff0c00 r8:8475892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758900 r8:8027ed34 r7:dfb9de60 r6:847b1100 r5:83ff0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c1c0 INFO: task kworker/1:50:3226 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bc74e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:51:3228 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:3228 tgid:3228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbe9d84 r8:00000002 r7:60000113 r6:dfbe9d8c r5:848b8c00 r4:848b8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475c8c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2cb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecafd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fa38c r4:847fa000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fa38c r4:84758980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:847589ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758980 r8:8027ed34 r7:dfbdde60 r6:847b1180 r5:848b8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c280 INFO: task kworker/1:51:3228 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bc74e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3230 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:848ba400 r4:848ba400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ba400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475ca00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fa78c r4:847fa400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fa78c r4:84758a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84758a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758a00 r8:8027ed34 r7:dfbe9e60 r6:847b1200 r5:848ba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c400 INFO: task kworker/1:52:3230 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bcb9c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3231 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:848bb000 r4:848bb000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595ca00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f2bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca9f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584738c r4:85847000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584738c r4:84758a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bb000 r8:84758aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758a80 r8:8027ed34 r7:dfbf9e60 r6:847b1280 r5:848bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c400 INFO: task kworker/1:53:3231 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bcb9c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3233 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:848b8000 r4:848b8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475ca80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f2c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca5f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fab8c r4:847fa800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fab8c r4:84758b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8000 r8:84758b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758b00 r8:8027ed34 r7:dfc01e60 r6:847b1300 r5:848b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c400 INFO: task kworker/1:54:3233 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bd3c1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3234 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:848b9800 r4:848b9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595c2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f2c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca25000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85847f8c r4:85847c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85847f8c r4:84758b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b9800 r8:84758bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758b80 r8:8027ed34 r7:dfc01e60 r6:847b1380 r5:848b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c6c0 INFO: task kworker/1:55:3234 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bd3c1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3237 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc25d84 r8:00000002 r7:60000113 r6:dfc25d8c r5:848be000 r4:848be000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848be000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595c500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848be000 r7:00000000 r6:83018200 r5:00001000 r4:7f2c3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85847b8c r4:85847800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85847b8c r4:84758c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848be000 r8:84758c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758c00 r8:8027ed34 r7:dfc01e60 r6:847b1400 r5:848be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c7c0 INFO: task kworker/1:56:3237 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bd3c1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:3239 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc35d84 r8:00000002 r7:60000113 r6:dfc35d8c r5:848bc800 r4:848bc800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bc800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595c7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f2c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584778c r4:85847400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584778c r4:84758c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bc800 r8:84758cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758c80 r8:8027ed34 r7:dfc01e60 r6:847b1480 r5:848bc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c940 INFO: task kworker/1:57:3239 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bd3c1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:3240 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc3dd84 r8:00000002 r7:60000013 r6:dfc3dd8c r5:848bd400 r4:848bd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f2040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f3f7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fc38c r4:847fc000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fc38c r4:84758d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bd400 r8:84758d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758d00 r8:8027ed34 r7:dfc35e60 r6:847b1500 r5:848bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475cb40 INFO: task kworker/1:58:3240 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bd934000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:59:3242 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:59 state:D stack:0 pid:3242 tgid:3242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc31d84 r8:00000002 r7:60000013 r6:dfc31d8c r5:840eb000 r4:840eb000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840eb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b4f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc0b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858cbf8c r4:858cbc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858cbf8c r4:84758d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840eb000 r8:84758dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758d80 r8:8027ed34 r7:dfc3de60 r6:84758e00 r5:840eb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475cb40 INFO: task kworker/1:59:3242 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bd934000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3243 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:848bec00 r4:848bec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe3b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85793f8c r4:85793c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85793f8c r4:847b1580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bec00 r8:847b15ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847b1580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b1580 r8:8027ed34 r7:dfbb5e60 r6:847b1600 r5:848bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481c940 INFO: task kworker/0:12:3243 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bdfcf000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:3247 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:839e1800 r4:839e1800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:839e1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b49c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:839e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f3f5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf99000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fc78c r4:847fc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fc78c r4:84758e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839e1800 r8:84758eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758e80 r8:8027ed34 r7:dfc3de60 r6:847b1680 r5:839e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475cec0 INFO: task kworker/1:60:3247 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bdfcf000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3249 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc4dd84 r8:00000002 r7:60000013 r6:dfc4dd8c r5:83ff0000 r4:83ff0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481e2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ff0000 r7:00000000 r6:83018200 r5:00001000 r4:7f3f1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd39000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fcf8c r4:847fcc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fcf8c r4:84758f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff0000 r8:84758f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758f00 r8:8027ed34 r7:dfc49e60 r6:847b1700 r5:83ff0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84976180 INFO: task kworker/1:61:3249 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: be1ad000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:62:3250 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:62 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc51d84 r8:00000002 r7:60000013 r6:dfc51d8c r5:83240c00 r4:83240c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83240c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481e300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83240c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3f3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf83000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fcb8c r4:847fc800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fcb8c r4:84758f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240c00 r8:84758fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758f80 r8:8027ed34 r7:dfc4de60 r6:847b1780 r5:83240c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847aef40 INFO: task kworker/1:62:3250 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: be6e4000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84719340 r5:84aa0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:847fd78c r4:847fd400 r10:00000000 r9:8474d000 r8:8027ed34 r7:dfc4de60 r6:847b1800 r5:84aa0000 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaeb5dc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84aa1800 r5:84aa1800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:84aa1800 r7:00000000 r6:83018200 r5:00001000 r4:7f3ef000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa5f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fd38c r4:847fd000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fd38c r4:8474d080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa1800 r8:8474d0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d080 r8:8027ed34 r7:dfc55e60 r6:847b1880 r5:84aa1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481e040 INFO: task kworker/1:64:3255 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bea9c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r5:84aa2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Call trace: 5d60: 800f0013 ffffffff r4:eaeb5dc0 r4:00000000 r5:8524af8c r4:8524ac00 r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:66:3258 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:66 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:84aa3000 r4:84aa3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aa3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481e800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aa3000 r7:00000000 r6:83018200 r5:00001000 r4:7f3eb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf13000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fdb8c r4:847fd800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fdb8c r4:8474d180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa3000 r8:8474d1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d180 r8:8027ed34 r7:dfc61e60 r6:847b1980 r5:84aa3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bf650000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:67:3261 blocked for more than 452 seconds. r4:84aa3c00 r5:84aa3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r5:00001000 r4:eadb5000 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84aa4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc6de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f2240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aa4800 r7:00000000 r6:83018200 r5:00001000 r4:7f3e5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb31000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fbb8c r4:847fb800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fbb8c r4:8474d280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa4800 r8:8474d2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d280 r8:8027ed34 r7:dfc69e60 r6:847b1a80 r5:84aa4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc6dfb0 to 0xdfc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481e5c0 INFO: task kworker/1:68:3263 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bfc08000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:69:3265 blocked for more than 452 seconds. [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84aa5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f2500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aa5400 r7:00000000 r6:83018200 r5:00001000 r4:7f3e3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fbf8c r4:847fbc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fbf8c r4:8474d300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa5400 r8:8474d32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d300 r8:8027ed34 r7:dfc6de60 r6:847b1b00 r5:84aa5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481ea00 INFO: task kworker/1:69:3265 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bffe3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84aa6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r5:00001000 r4:ed509000 r10:61c88647 r9:84aa6000 r8:8474d3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaeb5d20 to 0xeaeb5d68) r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:71:3270 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:71 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:84aa6c00 r4:84aa6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aa6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab6040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aa6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f549000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b7138c r4:85b71000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b7138c r4:8474d400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa6c00 r8:8474d42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d400 r8:8027ed34 r7:dfc75e60 r6:847b1c00 r5:84aa6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481ea80 INFO: task kworker/1:71:3270 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c01c0000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 r5:8524af8c r4:8524ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:84aa0c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b223c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aa0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed383000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc938c r4:85bc9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bc938c r4:8474d480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa0c00 r8:8474d4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d480 r8:8027ed34 r7:dfc59e60 r6:847b1c80 r5:84aa0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481e4c0 INFO: task kworker/1:72:3271 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c035b000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:13:3274 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred r4:848bbc00 r5:848bbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85794b8c r4:847b1d00 Exception stack(0xdfb7dfb0 to 0xdfb7dff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:73:3279 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:73 state:D stack:0 pid:3279 tgid:3279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:8458a400 r4:8458a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8458a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abe040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8458a400 r7:00000000 r6:83018200 r5:00001000 r4:7f51b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed28d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b67f8c r4:85b67c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b67f8c r4:8474d500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8458a400 r8:8474d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d500 r8:8027ed34 r7:dfc59e60 r6:847b1f00 r5:8458a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481ec80 INFO: task kworker/1:73:3279 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c0680000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3280 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc95d84 r8:00000002 r7:60000013 r6:dfc95d8c r5:84588c00 r4:84588c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84588c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84588c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7cb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85794f8c r4:85794c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85794f8c r4:847b1f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84588c00 r8:847b1fac r7:82804d40 r6:dddced40 r5:dddced60 r4:847b1f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b1f80 r8:8027ed34 r7:dfc7de60 r6:84a19000 r5:84588c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc95fb0 to 0xdfc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a1e440 INFO: task kworker/0:15:3280 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c0a98000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:74 state:D stack:0 pid:3282 tgid:3282 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8458bc00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85be1f8c r4:85be1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85be1f8c r4:8474d580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8458bc00 r8:8474d5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d580 r8:8027ed34 r7:dfc59e60 r6:84a19080 r5:8458bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e000 INFO: task kworker/1:74:3282 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c0f7e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:75:3283 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:75 state:D stack:0 pid:3283 tgid:3283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84589800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca5e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8474d600 r8:8027ed34 r7:dfca1e60 r6:84a19100 r5:84589800 r4:8474e000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaeb5d20 to 0xeaeb5d68) r4:eaeb5dc0 r4:00000000 r5:8524af8c r4:8524ac00 r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:76:3285 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:76 state:D stack:0 pid:3285 tgid:3285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcadd84 r8:00000002 r7:60000113 r6:dfcadd8c r5:8458d400 r4:8458d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8458d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85808cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8458d400 r7:00000000 r6:83018200 r5:00001000 r4:7f673000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc61000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b73b8c r4:85b73800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b73b8c r4:8474d680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8458d400 r8:8474d6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d680 r8:8027ed34 r7:dfca5e60 r6:84a19180 r5:8458d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e000 INFO: task kworker/1:76:3285 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c0f7e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:77:3287 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:77 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcbdd84 r8:00000002 r7:60000013 r6:dfcbdd8c r5:8458c800 r4:8458c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8458c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f6e00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8458c800 r7:00000000 r6:83018200 r5:00001000 r4:7f873000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd13000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8480178c r4:84801400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8480178c r4:8474d700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8458c800 r8:8474d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d700 r8:8027ed34 r7:dfcade60 r6:84a19200 r5:8458c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcbdfb0 to 0xdfcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e1c0 INFO: task kworker/1:77:3287 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c0f7e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:78:3289 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:78 state:D stack:0 pid:3289 tgid:3289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcd1d84 r8:00000002 r7:60000113 r6:dfcd1d8c r5:8458ec00 r4:8458ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8458ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85808980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8458ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f697000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7d9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847ffb8c r4:847ff800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847ffb8c r4:8474d780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8458ec00 r8:8474d7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d780 r8:8027ed34 r7:dfcbde60 r6:84a19280 r5:8458ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd1fb0 to 0xdfcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e300 INFO: task kworker/1:78:3289 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c1421000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:79:3291 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:79 state:D stack:0 pid:3291 tgid:3291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcd9d84 r8:00000002 r7:60000113 r6:dfcd9d8c r5:84960c00 r4:84960c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84960c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596c2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84960c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6ef000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb23000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bfc78c r4:85bfc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bfc78c r4:8474d800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84960c00 r8:8474d82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d800 r8:8027ed34 r7:dfcbde60 r6:84a19300 r5:84960c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd9fb0 to 0xdfcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e400 INFO: task kworker/1:79:3291 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c16da000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84960000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d880 r8:8027ed34 r7:dfcbde60 r6:84a19380 r5:84960000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce5fb0 to 0xdfce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e540 INFO: task kworker/1:80:3293 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c16da000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:81:3295 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:81 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcf9d84 r8:00000002 r7:60000113 r6:dfcf9d8c r5:84963000 r4:84963000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84963000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84963000 r7:00000000 r6:83018200 r5:00001000 r4:7f713000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed74f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c26b8c r4:85c26800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c26b8c r4:8474d900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84963000 r8:8474d92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d900 r8:8027ed34 r7:dfcbde60 r6:84a19400 r5:84963000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e6c0 INFO: task kworker/1:81:3295 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c1b07000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:82:3297 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:82 state:D stack:0 pid:3297 tgid:3297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:84961800 r4:84961800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84961800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd05e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474e800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84961800 r7:00000000 r6:83018200 r5:00001000 r4:7f735000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5e1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f878c r4:858f8400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858f878c r4:8474d980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84961800 r8:8474d9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d980 r8:8027ed34 r7:dfcbde60 r6:84a19480 r5:84961800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd05fb0 to 0xdfd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e900 INFO: task kworker/1:82:3297 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c1b07000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84963c00 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd0de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580c340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84963c00 r7:00000000 r6:83018200 r5:00001000 r4:7f7e3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede1f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c4878c r4:85c48400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c4878c r4:8474da00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84963c00 r8:8474da2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474da00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474da00 r8:8027ed34 r7:dfcbde60 r6:84a19500 r5:84963c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd0dfb0 to 0xdfd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474eac0 INFO: task kworker/1:83:3300 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c2629000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 INFO: task kworker/1:84:3301 blocked for more than 452 seconds. r4:84964800 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd11e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85488200 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:16 state:D stack:0 pid:3304 tgid:3304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcf1d84 r8:00000002 r7:60000013 r6:dfcf1d8c r5:84965400 r4:84965400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84965400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84965400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579578c r4:85795400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579578c r4:84a19600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84965400 r8:84a1962c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a19600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a19600 r8:8027ed34 r7:dfc7de60 r6:84a19680 r5:84965400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf1fb0 to 0xdfcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5b0c0 INFO: task kworker/0:16:3304 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c2629000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:85:3305 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:85 state:D stack:0 pid:3305 tgid:3305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd29d84 r8:00000002 r7:60000113 r6:dfd29d8c r5:84966000 r4:84966000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f6280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84966000 r7:00000000 r6:83018200 r5:00001000 r4:7f75f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c66f8c r4:85c66c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c66f8c r4:8474db00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84966000 r8:8474db2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474db00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474db00 r8:8027ed34 r7:dfcbde60 r6:84a19700 r5:84966000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd29fb0 to 0xdfd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474ee40 INFO: task kworker/1:85:3305 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r5:00001000 r4:eadb5000 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:86:3308 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:86 state:D stack:0 pid:3308 tgid:3308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:84a98000 r4:84a98000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a98000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f4a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a98000 r7:00000000 r6:83018200 r5:00001000 r4:7f925000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2c3000 r7:ddde2d40 r6:83018200 r5:84801b8c r4:8474db80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd3de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d2e040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f9a7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3a1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d7638c r4:85d76000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d7638c r4:8474dc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9a400 r8:8474dcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474dc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474dc80 r8:8027ed34 r7:df9e9e60 r6:8474dd00 r5:84a9a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd3dfb0 to 0xdfd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474ee40 INFO: task kworker/1:87:3310 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 800f0013 ffffffff r4:eaeb5dc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd39e08 r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:edef1000 r7:ddde2d40 r6:83018200 r5:84801f8c r4:8474dd80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598b900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7fa97000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee561000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d30b8c r4:85d30800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d30b8c r4:8474de80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:8474deac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474de80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474de80 r8:8027ed34 r7:dfd3de60 r6:8474df00 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc81fb0 to 0xdfc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84913280 INFO: task kworker/1:89:3316 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c36aa000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:90:3317 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:90 state:D stack:0 pid:3317 tgid:3317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd65d84 r8:00000002 r7:60000113 r6:dfd65d8c r5:84a9c800 r4:84a9c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a9c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd65e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d2e9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a9c800 r7:00000000 r6:83018200 r5:00001000 r4:7f951000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb7d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d7878c r4:85d78400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d7878c r4:8474df80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8474dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474df80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474df80 r8:8027ed34 r7:dfc81e60 r6:84a59000 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd65fb0 to 0xdfd65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84913280 INFO: task kworker/1:90:3317 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c36aa000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r5:8524af8c r4:8524ac00 r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) INFO: task kworker/1:91:3318 blocked for more than 452 seconds. r5:84a9d400 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd55e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a59080 r8:8027ed34 r7:dfc81e60 r6:84a59100 r5:84a9d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:92:3322 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:92 state:D stack:0 pid:3322 tgid:3322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd61d84 r8:00000002 r7:60000113 r6:dfd61d8c r5:84a9e000 r4:84a9e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a9e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd61e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cbeec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a9e000 r7:00000000 r6:83018200 r5:00001000 r4:7fa61000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee615000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d8e38c r4:85d8e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d8e38c r4:84a59180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:84a591ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a59180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a59180 r8:8027ed34 r7:dfc81e60 r6:84a59200 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84913780 INFO: task kworker/1:92:3322 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c3cb0000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dcfbc0 r5:85d30f8c r4:85d30c00 r10:00000000 r9:84a59400 r8:8027ed34 r7:dfd79e60 r6:84a59480 r5:840eec00 r4:84913b00 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c3cb0000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:95:3327 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:95 state:D stack:0 pid:3327 tgid:3327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:84518000 r4:84518000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84518000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85df02c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84518000 r7:00000000 r6:83018200 r5:00001000 r4:7fb0b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee4a7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85da3f8c r4:85da3c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84a59500 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a59600 r8:8027ed34 r7:dfd79e60 r6:84a59680 r5:84518c00 r4:84a5f080 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:82ac11e4 r4:00000000 r5:00001000 r4:eadb5000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:272 state:D stack:0 pid:4492 tgid:4492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaeadd84 r8:00000002 r7:60000113 r6:eaeadd8c r5:85213c00 r4:85213c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85213c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeade08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85213c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514eb8c r4:8514e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514eb8c r4:84b79d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85213c00 r8:84b79dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79d80 r8:8027ed34 r7:eae4de60 r6:84b79e00 r5:85213c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeadfb0 to 0xeaeadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/1:272:4492 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c47fe000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:416 state:D stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84791240 r7:dddced40 r6:83018000 r5:8524b38c r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:418:4501 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaed5d84 r8:00000002 r7:60000113 r6:eaed5d8c r5:85216c00 r4:85216c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85216c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84791640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf01000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525038c r4:85250000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525038c r4:84879e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216c00 r8:84879e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879e00 r8:8027ed34 r7:eaec9e60 r6:8497d100 r5:85216c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed5fb0 to 0xeaed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490bf40 INFO: task kworker/0:418:4501 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:82ac11e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85213000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eace1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: c4dd5000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:275:4506 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:275 state:D stack:0 pid:4506 tgid:4506 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaeb1d84 r8:00000002 r7:60000113 r6:eaeb1d8c r5:851a0000 r4:851a0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b74940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac77000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a4f8c r4:852a4c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a4f8c r4:8497d280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a0000 r8:8497d2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8497d280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497d280 r8:8027ed34 r7:eaed1e60 r6:8497d300 r5:851a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb1fb0 to 0xeaeb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719c40 INFO: task kworker/1:275:4506 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c4dd5000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eaee3000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: c50d1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r5:8524af8c r4:8524ac00 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:420 state:D stack:0 pid:4509 tgid:4509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaef5d84 r8:00000002 r7:60000113 r6:eaef5d8c r5:851a1800 r4:851a1800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84791400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524bb8c r4:8524b800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8524bb8c r4:84879f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a1800 r8:84879fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f80 r8:8027ed34 r7:eaed5e60 r6:8497d400 r5:851a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef5fb0 to 0xeaef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 INFO: task kworker/0:420:4509 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c50d1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 r5:851a3c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:eaeb5dc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:4513 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:4513 tgid:4513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf05d84 r8:00000002 r7:60000113 r6:eaf05d8c r5:8492d400 r4:8492d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf05e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847918c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf0f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525078c r4:85250400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525078c r4:84b6df80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492d400 r8:84b6dfac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6df80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6df80 r8:8027ed34 r7:eaed5e60 r6:849f8000 r5:8492d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf05fb0 to 0xeaf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 INFO: task kworker/0:422:4513 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c5add000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:423 state:D stack:0 pid:4516 tgid:4516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaeb9d84 r8:00000002 r7:60000113 r6:eaeb9d8c r5:8492e000 r4:8492e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84791980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf15000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8492e000 r8:849f80ac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: c5add000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r5:8524af8c r4:8524ac00 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:84719340 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf19e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eaf23000 r7:dddced40 r6:83018000 r5:85250f8c r4:849f8180 Exception stack(0xeaf19fb0 to 0xeaf19ff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r5:00001000 r4:eadb5000 r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:425:4520 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:425 state:D stack:0 pid:4520 tgid:4520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaef9d84 r8:00000002 r7:60000113 r6:eaef9d8c r5:8492bc00 r4:8492bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84791d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf29000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525138c r4:85251000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525138c r4:849f8280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492bc00 r8:849f82ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849f8280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f8280 r8:8027ed34 r7:eaf19e60 r6:849f8300 r5:8492bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef9fb0 to 0xeaef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84791b00 INFO: task kworker/0:425:4520 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c5e11000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:426:4523 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:426 state:D stack:0 pid:4523 tgid:4523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf21d84 r8:00000002 r7:60000013 r6:eaf21d8c r5:8492a400 r4:8492a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf21e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83931040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85251f8c r4:85251c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85251f8c r4:849f8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492a400 r8:849f83ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849f8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f8380 r8:8027ed34 r7:eaef9e60 r6:849f8400 r5:8492a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:8492c800 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf2de08 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84791dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf37000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525178c r4:85251400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525178c r4:849f8480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492c800 r8:849f84ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849f8480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f8480 r8:8027ed34 r7:eaf21e60 r6:849f8500 r5:8492c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf2dfb0 to 0xeaf2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84791e00 INFO: task kworker/0:427:4524 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c6558000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:428 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf41e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:84750000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 r5:00001000 r4:eaf3d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85251b8c r4:85251800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85251b8c r4:849f8580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84750000 r8:849f85ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849f8580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f8580 r8:8027ed34 r7:eaf21e60 r6:849f8600 r5:84750000 r4:00000001 Exception stack(0xeaf41fb0 to 0xeaf41ff8) Workqueue: events bpf_prog_free_deferred 5d20: c68ca000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r5:8524af8c r4:8524ac00 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 INFO: task kworker/0:429:4528 blocked for more than 452 seconds. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8525238c r4:85252000 r4:849f8680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eaf55d84 r8:00000002 r7:60000013 r6:eaf55d8c r5:84751800 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83931600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84751800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf75000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85252f8c r4:85252c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85252f8c r4:849f8780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84751800 r8:849f87ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849f8780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f8780 r8:8027ed34 r7:eaf35e60 r6:849f8800 r5:84751800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf55fb0 to 0xeaf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:83931100 INFO: task kworker/0:430:4530 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c68ca000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84719340 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaf61fb0 to 0xeaf61ff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8524af8c r4:8524ac00 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:4534 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:4534 tgid:4534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf6dd84 r8:00000002 r7:60000013 r6:eaf6dd8c r5:84753000 r4:84753000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84753000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf6de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83931500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84753000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf6f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85252b8c r4:85252800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85252b8c r4:849f8980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84753000 r8:849f89ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849f8980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f8980 r8:8027ed34 r7:eaf55e60 r6:849f8a00 r5:84753000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf6dfb0 to 0xeaf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:839314c0 INFO: task kworker/0:432:4534 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c71a7000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) INFO: task kworker/0:433:4536 blocked for more than 452 seconds. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:839316c0 r7:dddced40 r6:83018000 r5:8525338c r4:849f8a80 Exception stack(0xeaf79fb0 to 0xeaf79ff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c71a7000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:4538 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08 r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:eadb5000 r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:4540 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:4540 tgid:4540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf95d84 r8:00000002 r7:60000113 r6:eaf95d8c r5:84755400 r4:84755400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84755400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83931900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84755400 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa0f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525378c r4:85253400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525378c r4:849f8c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84755400 r8:849f8cac r7:82804d40 r6:dddced40 r5:dddced60 r4:849f8c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f8c80 r8:8027ed34 r7:eaf85e60 r6:849f8d00 r5:84755400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeaeb5d20 to 0xeaeb5d68) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) Not tainted 6.15.0-syzkaller #0 r5:84756000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83931ac0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85253b8c r4:85253800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85253b8c r4:849f8d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84756000 r8:849f8dac r7:82804d40 r6:dddced40 r5:dddced60 r4:849f8d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f8d80 r8:8027ed34 r7:eaf85e60 r6:849f8e00 r5:84756000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac0dfb0 to 0xeac0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:83931c00 INFO: task kworker/0:436:4541 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c7769000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eadddd84 r8:00000002 r7:60000013 r6:eadddd8c r5:84756c00 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83931f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:4546 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:4546 tgid:4546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadf5d84 r8:00000002 r7:60000013 r6:eadf5d8c r5:85268000 r4:85268000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85268000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529c38c r4:8529c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8529c38c r4:849f8f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85268000 r8:849f8fac r7:82804d40 r6:dddced40 r5:dddced60 r4:849f8f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f8f80 r8:8027ed34 r7:eaddde60 r6:84742000 r5:85268000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf5fb0 to 0xeadf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:83931d00 INFO: task kworker/0:438:4546 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) Not tainted 6.15.0-syzkaller #0 r5:85268c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84746040 r7:dddced40 r6:83018000 r5:8529cb8c r4:84742180 Exception stack(0xeaf49fb0 to 0xeaf49ff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:441:4552 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:441 state:D stack:0 pid:4552 tgid:4552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf99d84 r8:00000002 r7:60000013 r6:eaf99d8c r5:8526a400 r4:8526a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8526a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf99e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84746380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8526a400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4901000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529d38c r4:8529d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8529d38c r4:84742280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526a400 r8:847422ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84742280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742280 r8:8027ed34 r7:eae05e60 r6:84742300 r5:8526a400 r4:00000001 Exception stack(0xeaf99fb0 to 0xeaf99ff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaeb5dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) INFO: task kworker/0:442:4554 blocked for more than 453 seconds. r4:8526b000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e8981000 r10:61c88647 r9:8526b000 r8:847423ac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8524af8c r4:8524ac00 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eafa1d84 r8:00000002 r7:60000013 r6:eafa1d8c r5:8526bc00 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84746840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8526bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529df8c r4:8529dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8529df8c r4:84742480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526bc00 r8:847424ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84742480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742480 r8:8027ed34 r7:eaf9de60 r6:84742500 r5:8526bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa1fb0 to 0xeafa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84746480 INFO: task kworker/0:443:4556 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c8a9b000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84742580 r8:8027ed34 r7:eafa1e60 r6:84742600 r5:8526c800 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r5:00001000 r4:eadb5000 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eafa9d84 r8:00000002 r7:60000013 r6:eafa9d8c r5:8526d400 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84746a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8526d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa93000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529e38c r4:8529e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8529e38c r4:84742700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526d400 r8:8474272c r7:82804d40 r6:dddced40 r5:dddced60 r4:84742700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742700 r8:8027ed34 r7:eafa1e60 r6:84742780 r5:8526d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa9fb0 to 0xeafa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84746780 INFO: task kworker/0:445:4560 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c8dbd000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:4561 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8526e000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84746c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8526e000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab57000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529e78c r4:8529e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8529e78c r4:84742680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526e000 r8:847426ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84742680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742680 r8:8027ed34 r7:eafa9e60 r6:84742800 r5:8526e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb1fb0 to 0xeafb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84746780 INFO: task kworker/0:446:4561 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r4:00000000 r5:8524af8c r4:8524ac00 r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) INFO: task kworker/0:447:4564 blocked for more than 453 seconds. r4:84868c00 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08 r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eabcf000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8524af8c r4:8524ac00 r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:448:4565 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:448 state:D stack:0 pid:4565 tgid:4565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafbdd84 r8:00000002 r7:60000113 r6:eafbdd8c r5:851a5400 r4:851a5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafbde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84746e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529eb8c r4:8529e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8529eb8c r4:84742980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a5400 r8:847429ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84742980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742980 r8:8027ed34 r7:eafb9e60 r6:8497d500 r5:851a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafbdfb0 to 0xeafbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84746c00 INFO: task kworker/0:448:4565 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c94c5000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:4568 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:4568 tgid:4568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafc9d84 r8:00000002 r7:60000113 r6:eafc9d8c r5:851a4800 r4:851a4800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b74000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabed000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529f38c r4:8529f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8529f38c r4:84742a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a4800 r8:84742a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84742a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742a00 r8:8027ed34 r7:eafb9e60 r6:8497d580 r5:851a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc9fb0 to 0xeafc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b74140 INFO: task kworker/0:449:4568 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c97b8000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:eadb5000 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:450:4570 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:450 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaff9d84 r8:00000002 r7:60000113 r6:eaff9d8c r5:851a2400 r4:851a2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b74200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac03000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529f78c r4:8529f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8529f78c r4:84742a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a2400 r8:84742aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84742a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742a80 r8:8027ed34 r7:eafc9e60 r6:8497d600 r5:851a2400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d60: 800f0013 ffffffff [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:4571 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:4571 tgid:4571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:851a3000 r4:851a3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b746c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:852a478c r4:84742b00 r10:00000000 r9:84742b00 r8:8027ed34 r7:eaff9e60 r6:8497d680 r5:851a3000 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r5:00001000 r4:eadb5000 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:4573 tgid:4573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb009d84 r8:00000002 r7:60000113 r6:eb009d8c r5:851a6c00 r4:851a6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b74300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac17000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529fb8c r4:8529f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8529fb8c r4:84742b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a6c00 r8:84742bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84742b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742b80 r8:8027ed34 r7:eaffde60 r6:8497d700 r5:851a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b74440 INFO: task kworker/0:452:4573 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c9c7a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b74480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85218000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac2d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529ff8c r4:8529fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8529ff8c r4:84742c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85218000 r8:84742c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84742c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742c00 r8:8027ed34 r7:eaffde60 r6:8497d780 r5:85218000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb031fb0 to 0xeb031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b743c0 INFO: task kworker/0:453:4576 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ca0df000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:454:4578 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:454 state:D stack:0 pid:4578 tgid:4578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb03dd84 r8:00000002 r7:60000113 r6:eb03dd8c r5:85218c00 r4:85218c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85218c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb03de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b74ac0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85218c00 r8:84742cac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eadb5000 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b74780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85219800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac69000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a4b8c r4:852a4800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852a4b8c r4:84742d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85219800 r8:84742d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84742d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742d00 r8:8027ed34 r7:eb03de60 r6:8497d880 r5:85219800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb035fb0 to 0xeb035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b74840 INFO: task kworker/0:455:4580 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ca4cb000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512ffc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8521bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a638c r4:852a6000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852a638c r4:84742d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521bc00 r8:84742dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84742d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742d80 r8:8027ed34 r7:eb03de60 r6:8497d900 r5:8521bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb049fb0 to 0xeb049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b747c0 INFO: task kworker/0:456:4582 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ca4cb000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8524af8c r4:8524ac00 r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8521a400 r8:84742e2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaeb5d20 to 0xeaeb5d68) r4:eaeb5dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:458:4587 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:458 state:D stack:0 pid:4587 tgid:4587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb059d84 r8:00000002 r7:60000113 r6:eb059d8c r5:8521b000 r4:8521b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b74cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8521b000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a5b8c r4:852a5800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852a5b8c r4:84742e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521b000 r8:84742eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84742e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84742e80 r8:8027ed34 r7:eb049e60 r6:8497da00 r5:8521b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb059fb0 to 0xeb059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b74bc0 INFO: task kworker/0:458:4587 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ca900000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:276 state:D stack:0 pid:4589 tgid:4589 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a01900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8521d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514ef8c r4:8514ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514ef8c r4:8497da80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521d400 r8:8497daac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8497da80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497da80 r8:8027ed34 r7:eaed1e60 r6:8497db00 r5:8521d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb05dfb0 to 0xeb05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a01740 INFO: task kworker/1:276:4589 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d60: 800f0013 ffffffff r4:eaeb5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852a678c r4:852a6400 r10:00000000 r9:84742f00 r8:8027ed34 r7:eb049e60 r6:84742f80 r5:8486a400 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r5:8524af8c r4:8524ac00 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 INFO: task kworker/1:277:4593 blocked for more than 453 seconds. r10:829187f4 r9:eafb5d84 r8:00000002 r7:60000113 r6:eafb5d8c r5:8521e000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:852a5f8c r4:852a5c00 r10:00000000 r9:8497db80 r8:8027ed34 r7:eaed1e60 r6:8497dc00 r5:8521e000 r4:84a01980 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:278:4595 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:4595 tgid:4595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb061d84 r8:00000002 r7:60000113 r6:eb061d8c r5:8521ec00 r4:8521ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525e5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8521ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0779000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514ff8c r4:8514fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514ff8c r4:8497dc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521ec00 r8:8497dcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8497dc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497dc80 r8:8027ed34 r7:eafb5e60 r6:8497dd00 r5:8521ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb061fb0 to 0xeb061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a01b00 INFO: task kworker/1:278:4595 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r5:00001000 r4:eadb5000 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:460:4598 blocked for more than 453 seconds. r10:829187f4 r9:eafc1d84 r8:00000002 r7:60000113 r6:eafc1d8c r5:8521c800 r4:8521c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8521c800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafcd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a738c r4:852a7000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852a738c r4:85124000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521c800 r8:8512402c r7:82804d40 r6:dddced40 r5:dddced60 r4:85124000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124000 r8:8027ed34 r7:eb055e60 r6:8497dd80 r5:8521c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc1fb0 to 0xeafc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b74fc0 INFO: task kworker/0:460:4598 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cb446000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7040 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 5d20: cb446000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:462:4601 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:462 state:D stack:0 pid:4601 tgid:4601 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85320000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85320000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae09000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a6f8c r4:852a6c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852a6f8c r4:85124100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85320000 r8:8512412c r7:82804d40 r6:dddced40 r5:dddced60 r4:85124100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124100 r8:8027ed34 r7:eafc1e60 r6:8497de80 r5:85320000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 r4:851e7100 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eadb5000 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb079d84 r8:00000002 r7:60000113 r6:eb079d8c r5:85320c00 r4:85320c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85320c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85320c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852acb8c r4:852ac800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852acb8c r4:85124180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85320c00 r8:851241ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85124180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124180 r8:8027ed34 r7:eafc1e60 r6:8497df00 r5:85320c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb079fb0 to 0xeb079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e72c0 INFO: task kworker/0:463:4604 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cb8b3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 INFO: task kworker/0:464:4605 blocked for more than 453 seconds. r5:85322400 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85322400 r8:8512422c r7:82804d40 r6:dddced40 r5:dddced60 r4:85124200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124200 r8:8027ed34 r7:eb079e60 r6:8497df80 r5:85322400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb07dfb0 to 0xeb07dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e72c0 INFO: task kworker/0:464:4605 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cb8b3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7540 r5:852a7b8c r4:852a7800 r10:00000000 r9:85124280 r8:8027ed34 r7:eb079e60 r6:85117000 r5:85321800 r4:851e7440 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb091e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85323000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a7f8c r4:852a7c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852a7f8c r4:85124300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85323000 r8:8512432c r7:82804d40 r6:dddced40 r5:dddced60 r4:85124300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124300 r8:8027ed34 r7:eb079e60 r6:85117080 r5:85323000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb091fb0 to 0xeb091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e7580 INFO: task kworker/0:466:4609 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cbd5a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:4611 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:467 state:D stack:0 pid:4611 tgid:4611 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7880 r7:dddced40 r6:83018000 r5:852ac38c r4:85124380 Exception stack(0xeb09dfb0 to 0xeb09dff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cc04c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:279:4612 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:279 state:D stack:0 pid:4612 tgid:4612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0a1d84 r8:00000002 r7:60000113 r6:eb0a1d8c r5:85326000 r4:85326000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85326000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525e340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85326000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8514fb8c r4:85117100 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) Not tainted 6.15.0-syzkaller #0 r5:8486bc00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ac78c r4:852ac400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ac78c r4:85124400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486bc00 r8:8512442c r7:82804d40 r6:dddced40 r5:dddced60 r4:85124400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124400 r8:8027ed34 r7:eb079e60 r6:85124480 r5:8486bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb099fb0 to 0xeb099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e79c0 INFO: task kworker/0:468:4614 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cc36c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eaf45d84 r8:00000002 r7:60000113 r6:eaf45d8c r5:8486c800 r4:8486c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8486c800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0605000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852acf8c r4:852acc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852acf8c r4:85124500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:8512452c r7:82804d40 r6:dddced40 r5:dddced60 r4:85124500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124500 r8:8027ed34 r7:eb079e60 r6:85124580 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf45fb0 to 0xeaf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e7d40 INFO: task kworker/0:469:4618 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cc36c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:4621 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:4621 tgid:4621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb065d84 r8:00000002 r7:60000113 r6:eb065d8c r5:8486d400 r4:8486d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486d400 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb065e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85124600 r8:8027ed34 r7:eaf45e60 r6:85124680 r5:8486d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:4622 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:4622 tgid:4622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb071d84 r8:00000002 r7:60000113 r6:eb071d8c r5:8486e000 r4:8486e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c6000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8486e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4975000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ad78c r4:852ad400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ad78c r4:85124700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486e000 r8:8512472c r7:82804d40 r6:dddced40 r5:dddced60 r4:85124700 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) Not tainted 6.15.0-syzkaller #0 r4:8486b000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:e07c5000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:eaeb5dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:84868000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0661000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530478c r4:85304400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530478c r4:85117300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84868000 r8:8511732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85117300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85117300 r8:8027ed34 r7:eb0b1e60 r6:85124880 r5:84868000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b9fb0 to 0xeb0b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8525e500 INFO: task kworker/1:281:4626 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cd4b1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:282:4627 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:282 state:D stack:0 pid:4627 tgid:4627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0a9d84 r8:00000002 r7:60000113 r6:eb0a9d8c r5:85326c00 r4:85326c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85326c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb0a9fb0 to 0xeb0a9ff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:4630 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:4630 tgid:4630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0c1d84 r8:00000002 r7:60000013 r6:eb0c1d8c r5:85328000 r4:85328000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85328000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c6b80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85328000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852afb8c r4:852af800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852afb8c r4:85124900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85328000 r8:8512492c r7:82804d40 r6:dddced40 r5:dddced60 r4:85124900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124900 r8:8027ed34 r7:eb065e60 r6:85117480 r5:85328000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c1fb0 to 0xeb0c1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:473:4632 blocked for more than 453 seconds. r5:85329800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eab37000 r10:61c88647 r9:85329800 r8:851249ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85124980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124980 r8:8027ed34 r7:eb0c1e60 r6:85117500 r5:85329800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c9fb0 to 0xeb0c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c6240 INFO: task kworker/0:473:4632 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cda4d000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0cde08 r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c6240 INFO: task kworker/0:474:4633 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cda4d000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:4635 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:4635 tgid:4635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0d5d84 r8:00000002 r7:60000113 r6:eb0d5d8c r5:85328c00 r4:85328c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85328c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c6580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85328c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead01000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85124a80 r8:8027ed34 r7:eb0c1e60 r6:85117600 r5:85328c00 Workqueue: events bpf_prog_free_deferred 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8532b000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:ead19000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8532b000 r8:85124b2c r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c6600 INFO: task kworker/0:476:4637 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ce0dd000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:4640 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:4640 tgid:4640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0e9d84 r8:00000002 r7:60000113 r6:eb0e9d8c r5:8532bc00 r4:8532bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8532bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c67c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8532bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead31000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852aef8c r4:852aec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852aef8c r4:85124b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532bc00 r8:85124bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85124b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124b80 r8:8027ed34 r7:eb0c1e60 r6:85117700 r5:8532bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e9fb0 to 0xeb0e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c6540 INFO: task kworker/0:477:4640 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ce34b000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:4641 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:4641 tgid:4641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0edd84 r8:00000002 r7:60000013 r6:eb0edd8c r5:8532c800 r4:8532c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8532c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c6940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8532c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead4b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852af38c r4:852af000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852af38c r4:85124c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532c800 r8:85124c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85124c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124c00 r8:8027ed34 r7:eb0c1e60 r6:85117780 r5:8532c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0edfb0 to 0xeb0edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c6740 INFO: task kworker/0:478:4641 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ce34b000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:4643 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:4643 tgid:4643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0f5d84 r8:00000002 r7:60000113 r6:eb0f5d8c r5:8532ec00 r4:8532ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8532ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c6a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8532ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead99000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852af78c r4:852af400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852af78c r4:85124c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532ec00 r8:85124cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85124c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124c80 r8:8027ed34 r7:eb0c1e60 r6:85117800 r5:8532ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f5fb0 to 0xeb0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c69c0 INFO: task kworker/0:479:4643 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ce780000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:4646 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:4646 tgid:4646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb101d84 r8:00000002 r7:60000113 r6:eb101d8c r5:85323c00 r4:85323c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85323c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d6300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85323c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b4f8c r4:852b4c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b4f8c r4:85124d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85323c00 r8:85124d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85124d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124d00 r8:8027ed34 r7:eb0c1e60 r6:85117880 r5:85323c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c6740 INFO: task kworker/0:480:4646 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ce780000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:481:4647 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:4647 tgid:4647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb105d84 r8:00000002 r7:60000113 r6:eb105d8c r5:8532d400 r4:8532d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8532d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb105e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c6d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8532d400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852aff8c r4:852afc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852aff8c r4:85124d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532d400 r8:85124dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85124d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124d80 r8:8027ed34 r7:eb101e60 r6:85117900 r5:8532d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb105fb0 to 0xeb105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c6b00 INFO: task kworker/0:481:4647 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cedf0000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:4649 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:4649 tgid:4649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb10dd84 r8:00000002 r7:60000013 r6:eb10dd8c r5:85324800 r4:85324800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85324800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c6e00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85324800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b438c r4:852b4000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b438c r4:85124e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85324800 r8:85124e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85124e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124e00 r8:8027ed34 r7:eb101e60 r6:85117980 r5:85324800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb10dfb0 to 0xeb10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c6c40 INFO: task kworker/0:482:4649 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cedf0000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:4651 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:483 state:D stack:0 pid:4651 tgid:4651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0add84 r8:00000002 r7:60000113 r6:eb0add8c r5:84869800 r4:84869800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84869800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ade08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525ef80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84869800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b478c r4:852b4400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b478c r4:85124e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84869800 r8:85124eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85124e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124e80 r8:8027ed34 r7:eb101e60 r6:85124f00 r5:84869800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0adfb0 to 0xeb0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c6d80 INFO: task kworker/0:483:4651 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cf0f8000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:4654 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:4654 tgid:4654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0b5d84 r8:00000002 r7:60000013 r6:eb0b5d8c r5:85330c00 r4:85330c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85330c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d6040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85330c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaefd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b4b8c r4:852b4800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b4b8c r4:85124f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85330c00 r8:85124fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85124f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124f80 r8:8027ed34 r7:eb101e60 r6:85117a00 r5:85330c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b5fb0 to 0xeb0b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d6000 INFO: task kworker/0:484:4654 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cf288000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:4655 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:283 state:D stack:0 pid:4655 tgid:4655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb115d84 r8:00000002 r7:60000113 r6:eb115d8c r5:85331800 r4:85331800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85331800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb115e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85128340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85331800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf09000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844b878c r4:844b8400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844b878c r4:85117a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85331800 r8:85117aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85117a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85117a80 r8:8027ed34 r7:eb0b9e60 r6:85117b00 r5:85331800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb115fb0 to 0xeb115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85128040 INFO: task kworker/1:283:4655 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cf288000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:4657 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:4657 tgid:4657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb119d84 r8:00000002 r7:60000013 r6:eb119d8c r5:85332400 r4:85332400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85332400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d6400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85332400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf27000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b538c r4:852b5000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b538c r4:847cf000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85332400 r8:847cf02c r7:82804d40 r6:dddced40 r5:dddced60 r4:847cf000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf000 r8:8027ed34 r7:eb101e60 r6:85117b80 r5:85332400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb119fb0 to 0xeb119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d6140 INFO: task kworker/0:485:4657 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cf578000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:284:4659 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:284 state:D stack:0 pid:4659 tgid:4659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb111d84 r8:00000002 r7:60000113 r6:eb111d8c r5:85333000 r4:85333000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85333000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb111e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e1e00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85333000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb089000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844b938c r4:844b9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844b938c r4:85117c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85333000 r8:85117c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85117c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85117c00 r8:8027ed34 r7:eb0b9e60 r6:85117c80 r5:85333000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb111fb0 to 0xeb111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85128300 INFO: task kworker/1:284:4659 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cf870000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:4663 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb11dd84 r8:00000002 r7:60000113 r6:eb11dd8c r5:8526ec00 r4:8526ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8526ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d6500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8526ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf39000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b578c r4:852b5400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b578c r4:847cf080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526ec00 r8:847cf0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847cf080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf080 r8:8027ed34 r7:eb119e60 r6:847cf100 r5:8526ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb11dfb0 to 0xeb11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d6380 INFO: task kworker/0:486:4663 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cfb87000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:4664 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:4664 tgid:4664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb121d84 r8:00000002 r7:60000113 r6:eb121d8c r5:84950000 r4:84950000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84950000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb121e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d6840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84950000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf67000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b5f8c r4:852b5c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b5f8c r4:847cf180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84950000 r8:847cf1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847cf180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf180 r8:8027ed34 r7:eb11de60 r6:847cf200 r5:84950000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb121fb0 to 0xeb121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d6480 INFO: task kworker/0:487:4664 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: cfc72000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:4666 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:4666 tgid:4666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb125d84 r8:00000002 r7:60000113 r6:eb125d8c r5:84950c00 r4:84950c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84950c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d6680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84950c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf51000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b5b8c r4:852b5800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b5b8c r4:847cf280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84950c00 r8:847cf2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847cf280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf280 r8:8027ed34 r7:eb121e60 r6:847cf300 r5:84950c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb125fb0 to 0xeb125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d65c0 INFO: task kworker/0:488:4666 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d0353000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) INFO: task kworker/0:489:4668 blocked for more than 454 seconds. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852b638c r4:852b6000 r10:00000000 r9:847cf380 r8:8027ed34 r7:eb121e60 r6:85117d00 r5:85333c00 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaeb5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 INFO: task kworker/0:490:4670 blocked for more than 454 seconds. [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d6a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85336000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa23000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b678c r4:852b6400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b678c r4:847cf400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85336000 r8:847cf42c r7:82804d40 r6:dddced40 r5:dddced60 r4:847cf400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf400 r8:8027ed34 r7:eb131e60 r6:85117d80 r5:85336000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb029fb0 to 0xeb029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d6ac0 INFO: task kworker/0:490:4670 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d0723000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r5:8524af8c r4:8524ac00 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:852b6b8c r4:847cf480 Exception stack(0xeb135fb0 to 0xeb135ff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaeb5dc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:492 state:D stack:0 pid:4674 tgid:4674 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852b738c r4:852b7000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b738c r4:847cf500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85335400 r8:847cf52c r7:82804d40 r6:dddced40 r5:dddced60 r4:847cf500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf500 r8:8027ed34 r7:eb135e60 r6:85117e80 r5:85335400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb13dfb0 to 0xeb13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d6a80 INFO: task kworker/0:492:4674 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d0b29000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:493:4677 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:493 state:D stack:0 pid:4677 tgid:4677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb129d84 r8:00000002 r7:60000013 r6:eb129d8c r5:84951800 r4:84951800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84951800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d6dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84951800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e012b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b6f8c r4:852b6c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b6f8c r4:847cf580 r10:61c88647 r9:84951800 r8:847cf5ac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:eaeb5dc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:494 state:D stack:0 pid:4678 tgid:4678 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84952400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89f7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b7f8c r4:852b7c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b7f8c r4:847cf680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84952400 r8:847cf6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847cf680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf680 r8:8027ed34 r7:eb13de60 r6:847cf700 r5:84952400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb12dfb0 to 0xeb12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8525ea00 INFO: task kworker/0:494:4678 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d11de000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:8524af8c r4:8524ac00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d6100 r7:dddced40 r6:83018000 r5:852b778c r4:847cf780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaeb5d20 to 0xeaeb5d68) r4:eaeb5dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:4682 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:4682 tgid:4682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb149d84 r8:00000002 r7:60000013 r6:eb149d8c r5:84953c00 r4:84953c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84953c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84777080 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84953c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4913000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b7b8c r4:852b7800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b7b8c r4:847cf880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84953c00 r8:847cf8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847cf880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf880 r8:8027ed34 r7:eb12de60 r6:847cf900 r5:84953c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb149fb0 to 0xeb149ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5a0c0 INFO: task kworker/0:496:4682 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d146d000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r4:eaeb5dc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb14de08 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb14dfb0 to 0xeb14dff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) INFO: task kworker/0:498:4687 blocked for more than 454 seconds. r4:8486ec00 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb159e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8486ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b878c r4:852b8400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b878c r4:847cfa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486ec00 r8:847cfaac r7:82804d40 r6:dddced40 r5:dddced60 r4:847cfa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cfa80 r8:8027ed34 r7:eb14de60 r6:85117f00 r5:8486ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb159fb0 to 0xeb159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5a240 INFO: task kworker/0:498:4687 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d171e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb15dd84 r8:00000002 r7:60000013 r6:eb15dd8c r5:85334800 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a8c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a5a300 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:4690 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:4690 tgid:4690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb161d84 r8:00000002 r7:60000113 r6:eb161d8c r5:85330000 r4:85330000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85330000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85330000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d1980000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Not tainted 6.15.0-syzkaller #0 r4:8532e000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a6c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8532e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b8f8c r4:852b8c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b8f8c r4:847cfc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532e000 r8:847cfc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847cfc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cfc00 r8:8027ed34 r7:eb15de60 r6:851ac080 r5:8532e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb165fb0 to 0xeb165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5a680 INFO: task kworker/0:501:4691 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r4:00000000 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) INFO: task kworker/0:502:4693 blocked for more than 454 seconds. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:852b938c r4:847cfc80 r4:847cfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cfc80 r8:8027ed34 r7:eb15de60 r6:851ac100 r5:85338000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb155fb0 to 0xeb155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5a740 INFO: task kworker/0:502:4693 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d2059000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 INFO: task kworker/0:503:4697 blocked for more than 454 seconds. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb151e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb380 r7:dddced40 r6:83018000 r5:852bbb8c r4:847cfd00 Exception stack(0xeb151fb0 to 0xeb151ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5aa40 INFO: task kworker/0:503:4697 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d2320000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eadb5000 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:4699 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:4699 tgid:4699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb175d84 r8:00000002 r7:60000013 r6:eb175d8c r5:8533a400 r4:8533a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb175e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5aa80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533a400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac63000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b9b8c r4:852b9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b9b8c r4:847cfe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533a400 r8:847cfe2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847cfe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cfe00 r8:8027ed34 r7:eb151e60 r6:851ac180 r5:8533a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb175fb0 to 0xeb175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5abc0 INFO: task kworker/0:504:4699 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d2694000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:505:4701 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:505 state:D stack:0 pid:4701 tgid:4701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb17dd84 r8:00000002 r7:60000013 r6:eb17dd8c r5:85339800 r4:85339800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85339800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb17de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5ac40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85339800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac81000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b9f8c r4:852b9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b9f8c r4:847cfe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85339800 r8:847cfeac r7:82804d40 r6:dddced40 r5:dddced60 r4:847cfe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cfe80 r8:8027ed34 r7:eb151e60 r6:851ac200 r5:85339800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb17dfb0 to 0xeb17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5a9c0 INFO: task kworker/0:505:4701 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d2984000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r4:eaeb5dc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5ad00 r5:852ba38c r4:852ba000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533c800 r8:847cff2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847cff00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cff00 r8:8027ed34 r7:eb151e60 r6:851ac280 r5:8533c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb185fb0 to 0xeb185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5ac00 INFO: task kworker/0:506:4703 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d2984000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:507 state:D stack:0 pid:4704 tgid:4704 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r9:83018005 r8:85338c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:85338c00 r8:847cffac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:eaeb5dc0 r5:00001000 r4:eadb5000 r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:4706 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:4706 tgid:4706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:8533bc00 r4:8533bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84777380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bab8c r4:852ba800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852bab8c r4:851db000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533bc00 r8:851db02c r7:82804d40 r6:dddced40 r5:dddced60 r4:851db000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db000 r8:8027ed34 r7:eb151e60 r6:851ac380 r5:8533bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb191fb0 to 0xeb191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5ae80 INFO: task kworker/0:508:4706 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d2c78000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d60: 800f0013 ffffffff r4:eaeb5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:4708 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:4708 tgid:4708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb199d84 r8:00000002 r7:60000113 r6:eb199d8c r5:8533e000 r4:8533e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533e000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852baf8c r4:852bac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852baf8c r4:851db080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533e000 r8:851db0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851db080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb199fb0 to 0xeb199ff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaeb5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:510 state:D stack:0 pid:4711 tgid:4711 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:852bb38c r4:852bb000 r10:61c88647 r9:8533d400 r8:851db12c r7:82804d40 r6:dddced40 r5:dddced60 r4:851bb280 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:4712 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1a9d84 r8:00000002 r7:60000113 r6:eb1a9d8c r5:85340000 r4:85340000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85340000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85340000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaded000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bb78c r4:852bb400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852bb78c r4:851db180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85340000 r8:851db1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851db180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db180 r8:8027ed34 r7:eb151e60 r6:851ac500 r5:85340000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a9fb0 to 0xeb1a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bb080 INFO: task kworker/0:511:4712 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d34c1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852bbf8c r4:852bbc00 r10:61c88647 r9:85341800 r8:851db2ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bb2c0 INFO: task kworker/0:512:4714 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d34c1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:4716 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:4716 tgid:4716 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb480 r7:dddced40 r6:83018000 r5:852bc78c r4:851db200 r4:00000001 r4:851bb680 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r4:eaeb5dc0 r5:00001000 r4:eadb5000 r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85342400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb6c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85342400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bc38c r4:852bc000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852bc38c r4:851db300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85342400 r8:851db32c r7:82804d40 r6:dddced40 r5:dddced60 r4:851db300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db300 r8:8027ed34 r7:eb1b9e60 r6:851ac680 r5:85342400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c1fb0 to 0xeb1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bb480 INFO: task kworker/0:514:4718 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d3a4e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:4720 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:4720 tgid:4720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1c9d84 r8:00000002 r7:60000013 r6:eb1c9d8c r5:85343000 r4:85343000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85343000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85343000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb005000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bcb8c r4:852bc800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852bcb8c r4:851db380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85343000 r8:851db3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851db380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db380 r8:8027ed34 r7:eb1b9e60 r6:851ac700 r5:85343000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c9fb0 to 0xeb1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bb600 INFO: task kworker/0:515:4720 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d3f6c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:516:4722 blocked for more than 454 seconds. r5:85345400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:851bb7c0 Call trace: 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:517:4724 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:517 state:D stack:0 pid:4724 tgid:4724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1d9d84 r8:00000002 r7:60000113 r6:eb1d9d8c r5:85344800 r4:85344800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85344800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85344800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bcf8c r4:852bcc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852bcf8c r4:851db480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85344800 r8:851db4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851db480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db480 r8:8027ed34 r7:eb1d1e60 r6:851ac800 r5:85344800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d9fb0 to 0xeb1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bb8c0 INFO: task kworker/0:517:4724 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:4726 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:4726 tgid:4726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb169d84 r8:00000002 r7:60000113 r6:eb169d8c r5:84956c00 r4:84956c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84956c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bbb00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84956c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb043000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bd38c r4:852bd000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852bd38c r4:851db500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84956c00 r8:851db52c r7:82804d40 r6:dddced40 r5:dddced60 r4:851db500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db500 r8:8027ed34 r7:eb1d1e60 r6:851db580 r5:84956c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb169fb0 to 0xeb169ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bba00 INFO: task kworker/0:518:4726 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d44c4000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:519 state:D stack:0 pid:4729 tgid:4729 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851bbc40 Call trace: 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r4:eaeb5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b79e80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:520:4731 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:520 state:D stack:0 pid:4731 tgid:4731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb145d84 r8:00000002 r7:60000113 r6:eb145d8c r5:84a89800 r4:84a89800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a89800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85128f80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a89800 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa15000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844b978c r4:844b9400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:844b978c r4:851db700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a89800 r8:851db72c r7:82804d40 r6:dddced40 r5:dddced60 r4:851db700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db700 r8:8027ed34 r7:eb1e1e60 r6:851db780 r5:84a89800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bbe80 INFO: task kworker/0:520:4731 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d4d97000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r4:eaeb5dc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:521 state:D stack:0 pid:4732 tgid:4732 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c1140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a8a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bdf8c r4:852bdc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852bdf8c r4:851db800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8a400 r8:851db82c r7:82804d40 r6:dddced40 r5:dddced60 r4:851db800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db800 r8:8027ed34 r7:eb145e60 r6:851db880 r5:84a8a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e5fb0 to 0xeb1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:285:4735 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:285 state:D stack:0 pid:4735 tgid:4735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1ddd84 r8:00000002 r7:60000113 r6:eb1ddd8c r5:85343c00 r4:85343c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85343c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1dde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b7140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85343c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530438c r4:85304000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530438c r4:851ac880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85343c00 r8:851ac8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851ac880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:522 state:D stack:0 pid:4736 tgid:4736 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaeb5d20 to 0xeaeb5d68) r4:eaeb5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474b0c0 r10:61c88647 r9:85346000 r8:851db9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c5fb0 to 0xeb0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c1380 INFO: task kworker/0:523:4741 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d5c4d000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:524 state:D stack:0 pid:4742 tgid:4742 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:eaeb5dc0 r5:00001000 r4:eadb5000 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:4744 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:286 state:D stack:0 pid:4744 tgid:4744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0d9d84 r8:00000002 r7:60000113 r6:eb0d9d8c r5:8533ec00 r4:8533ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b75c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8533ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e497d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85304f8c r4:85304c00 r7:ddde2d40 r6:83018200 r5:85304f8c r4:851acb00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:eaeb5dc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:287 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b7400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85348000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07bd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85304b8c r4:85304800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85304b8c r4:851acc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85348000 r8:851acc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851acc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851acc00 r8:8027ed34 r7:eb0d9e60 r6:851acc80 r5:85348000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e1fb0 to 0xeb0e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b7240 INFO: task kworker/1:287:4746 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d6331000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85348c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b76c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85348c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530538c r4:85305000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530538c r4:851acd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85348c00 r8:851acdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851acd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851acd80 r8:8027ed34 r7:eb0d9e60 r6:851ace00 r5:85348c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f1fb0 to 0xeb0f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b7800 INFO: task kworker/1:288:4748 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d65e1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a88c00 r5:84a88c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85305b8c r4:85305800 r10:00000000 r9:851acd00 r8:8027ed34 r7:eb0f1e60 r6:851dba80 r5:84a88c00 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:290:4751 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:290 state:D stack:0 pid:4751 tgid:4751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb205d84 r8:00000002 r7:60000113 r6:eb205d8c r5:84a8c800 r4:84a8c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a8c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb205e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b7880 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaeb5d20 to 0xeaeb5d68) r4:eaeb5dc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:291:4754 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:291 state:D stack:0 pid:4754 tgid:4754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb211d84 r8:00000002 r7:60000013 r6:eb211d8c r5:84a8d400 r4:84a8d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a8d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb211e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b7a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead33000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85305f8c r4:85305c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85305f8c r4:851acf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8d400 r8:851acf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851acf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851acf00 r8:8027ed34 r7:eb201e60 r6:851dbb80 r5:84a8d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb211fb0 to 0xeb211ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b7980 INFO: task kworker/1:291:4754 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d6fe2000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:84a8e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb215fb0 to 0xeb215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b7980 INFO: task kworker/1:292:4755 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d6fe2000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84a8bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb21de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c24c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf25000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85307b8c r4:85307800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85307b8c r4:851be000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8bc00 r8:851be02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851be000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:851b7ac0 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r4:eaeb5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a8ec00 r5:84a8ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:84a8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530678c r4:85306400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530678c r4:851be080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8ec00 r8:851be0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851be080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be080 r8:8027ed34 r7:eb21de60 r6:851dbd00 r5:84a8ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb225fb0 to 0xeb225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b7f00 INFO: task kworker/1:294:4759 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d7909000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84a8b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r5:8524af8c r4:8524ac00 r4:84b79e80 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:4763 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb235d84 r8:00000002 r7:60000113 r6:eb235d8c r5:85270c00 r4:85270c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85270c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c2040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85270c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85306f8c r4:85306c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85306f8c r4:851be180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85270c00 r8:851be1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851be180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be180 r8:8027ed34 r7:eb21de60 r6:851dbe00 r5:85270c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb235fb0 to 0xeb235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c2080 INFO: task kworker/1:296:4763 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d7d4d000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) INFO: task kworker/1:297:4765 blocked for more than 455 seconds. r5:85270000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c2180 r5:8530738c r4:85307000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530738c r4:851be200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85270000 r8:851be22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851be200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be200 r8:8027ed34 r7:eb21de60 r6:851dbe80 r5:85270000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb23dfb0 to 0xeb23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c22c0 INFO: task kworker/1:297:4765 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d7d4d000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb239d84 r8:00000002 r7:60000113 r6:eb239d8c r5:8534a400 r5:8534a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb239e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c2340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8534a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf11000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530778c r4:85307400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530778c r4:851be280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534a400 r8:851be2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851be280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be280 r8:8027ed34 r7:eb21de60 r6:851be300 r5:8534a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb239fb0 to 0xeb239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c2340 INFO: task kworker/1:298:4767 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d83c7000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8534b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:851c2440 Call trace: 5d60: 800f0013 ffffffff r4:eaeb5dc0 r5:00001000 r4:eadb5000 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:300 state:D stack:0 pid:4771 tgid:4771 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8534bc00 r4:829187f0 r4:00000000 r9:83018205 r8:8534bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:61c88647 r9:8534bc00 r8:851be4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c2440 INFO: task kworker/1:300:4771 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d83c7000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:4774 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:4774 tgid:4774 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8534d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:8530c38c r4:8530c000 r4:851be580 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d60: 800f0013 ffffffff r4:eaeb5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829187f4 r9:eb24dd84 r8:00000002 r7:60000113 r6:eb24dd8c r5:8534ec00 r5:8534ec00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb24de08 r5:00001000 r4:eb0e3000 r7:ddde2d40 r6:83018200 r5:8530cf8c r4:851be680 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:eaeb5dc0 r5:00001000 r4:eadb5000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:4777 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:4777 tgid:4777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb251d84 r8:00000002 r7:60000113 r6:eb251d8c r5:8534c800 r4:8534c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8534c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c2c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8534c800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0bd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530cb8c r4:8530c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530cb8c r4:851be780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534c800 r8:851be7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851be780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be780 r8:8027ed34 r7:eb24de60 r6:851be800 r5:8534c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb251fb0 to 0xeb251ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:eaeb5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:304 state:D stack:0 pid:4780 tgid:4780 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85349800 r4:829187f0 r4:00000000 r9:83018205 r8:85349800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 r10:00000000 r9:851be880 r8:8027ed34 r7:eb24de60 r6:851be900 r5:85349800 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d918c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:305:4781 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:305 state:D stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb259d84 r8:00000002 r7:60000013 r6:eb259d8c r5:85350c00 r4:85350c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85350c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb259e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:85350c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 r10:61c88647 r9:85350c00 r8:851be9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851c2280 Call trace: r4:82ac11e4 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85273000 r5:85273000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb261e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85273000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb291000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530e78c r4:8530e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530e78c r4:851bea80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85273000 r8:851beaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851bea80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bea80 r8:8027ed34 r7:eb259e60 r6:851dbf00 r5:85273000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb261fb0 to 0xeb261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84974000 INFO: task kworker/1:306:4784 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d99cf000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85273c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85273c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb26d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530db8c r4:8530d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530db8c r4:851beb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85273c00 r8:851beb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851beb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851beb00 r8:8027ed34 r7:eb261e60 r6:851dbf80 r5:85273c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb265fb0 to 0xeb265ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85274800 r5:85274800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:85274800 r8:851bebac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849744c0 INFO: task kworker/1:308:4788 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: d9bff000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r4:eaeb5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 INFO: task kworker/0:525:4790 blocked for more than 455 seconds. r5:85275400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:852bf38c r4:84909080 Exception stack(0xeb271fb0 to 0xeb271ff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:4792 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:4792 tgid:4792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb279d84 r8:00000002 r7:60000113 r6:eb279d8c r5:85276000 r4:85276000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85276000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb279e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474b180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85276000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb281000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852beb8c r4:852be800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852beb8c r4:84909180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85276000 r8:849091ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84909180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909180 r8:8027ed34 r7:eb271e60 r6:84909200 r5:85276000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb279fb0 to 0xeb279ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaeb5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85276c00 r5:85276c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 r5:00001000 r4:eacbf000 r10:61c88647 r9:85276c00 r8:849092ac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:527:4794 is blocked on a mutex likely owned by task kworker/1:273:4493. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:309:4796 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:4796 tgid:4796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2a1d84 r8:00000002 r7:60000113 r6:eb2a1d8c r5:85271800 r4:85271800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85271800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85271800 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa37000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530ef8c r4:8530ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530ef8c r4:851bec00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85271800 r8:851bec2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851bec00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bec00 r8:8027ed34 r7:eb261e60 r6:84909380 r5:85271800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849746c0 INFO: task kworker/1:309:4796 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xeaeb5d20 to 0xeaeb5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r5:8524af8c r4:8524ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84956000 r5:84956000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:311:4807 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:311 state:D stack:0 pid:4807 tgid:4807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:85280c00 r4:85280c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85280c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85280c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530f38c r4:8530f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530f38c r4:851bed00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85280c00 r8:851bed2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851bed00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bed00 r8:8027ed34 r7:eb2a1e60 r6:84909480 r5:85280c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472b000 INFO: task kworker/1:311:4807 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: db8a4000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r5:00001000 r4:eadb5000 r5:8524af8c r4:8524ac00 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:312:4808 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:312 state:D stack:0 pid:4808 tgid:4808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb289d84 r8:00000002 r7:60000113 r6:eb289d8c r5:85352400 r4:85352400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85352400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb289e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85352400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0497000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530f78c r4:8530f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530f78c r4:851bed80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85352400 r8:851bedac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851bed80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bed80 r8:8027ed34 r7:eb2c5e60 r6:851bee00 r5:85352400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb289fb0 to 0xeb289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472b000 INFO: task kworker/1:312:4808 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: db8a4000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:313:4809 blocked for more than 455 seconds. r5:85351800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85351800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530fb8c r4:8530f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530fb8c r4:851bee80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85351800 r8:851beeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xeaeb5d20 to 0xeaeb5d68) r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85353000 r5:85353000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472b000 INFO: task kworker/1:314:4810 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: dbf12000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:315:4811 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:315 state:D stack:0 pid:4811 tgid:4811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2cdd84 r8:00000002 r7:60000113 r6:eb2cdd8c r5:85353c00 r4:85353c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85353c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2cde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85353c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa67000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8531438c r4:85314000 r10:00000000 r9:8477a080 r8:8027ed34 r7:eb2c9e60 r6:8477a100 r5:85353c00 INFO: task kworker/1:315:4811 is blocked on a mutex likely owned by task kworker/1:273:4493. 5d60: 800f0013 ffffffff r4:eaeb5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:316:4812 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:316 state:D stack:0 pid:4812 tgid:4812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2d1d84 r8:00000002 r7:60000113 r6:eb2d1d8c r5:85354800 r4:85354800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85354800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974f80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85354800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab61000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531478c r4:85314400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8531478c r4:8477a180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85354800 r8:8477a1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8477a180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477a180 r8:8027ed34 r7:eb2cde60 r6:8477a200 r5:85354800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472b000 INFO: task kworker/1:316:4812 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 5d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b79e80 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:317:4813 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred r5:85355400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 r5:00001000 r4:eabe3000 r7:ddde2d40 r6:83018200 r5:85314b8c r4:8477a280 r10:61c88647 r9:85355400 r8:8477a2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8477a280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477a280 r8:8027ed34 r7:eb2d1e60 r6:8477a300 r5:85355400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472b000 INFO: task kworker/1:317:4813 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: dc9a7000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:318:4814 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:318 state:D stack:0 pid:4814 tgid:4814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2d9d84 r8:00000002 r7:60000113 r6:eb2d9d8c r5:85356000 r4:85356000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85356000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472b980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85356000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531538c r4:85315000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8531538c r4:8477a380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85356000 r8:8477a3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8477a380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477a380 r8:8027ed34 r7:eb2d5e60 r6:8477a400 r5:85356000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472b000 INFO: task kworker/1:318:4814 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: dccaf000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r5:8524af8c r4:8524ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85356c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaeb5d20 to 0xeaeb5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:320:4818 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:320 state:D stack:0 pid:4818 tgid:4818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2c1d84 r8:00000002 r7:60000113 r6:eb2c1d8c r5:85350000 r4:85350000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85350000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853643c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85350000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf69000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85315f8c r4:85315c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85315f8c r4:8477a580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85350000 r8:8477a5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8477a580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477a580 r8:8027ed34 r7:eb2d9e60 r6:8477a600 r5:85350000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c1fb0 to 0xeb2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472b900 INFO: task kworker/1:320:4818 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: dd03e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:4820 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:4820 tgid:4820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2e1d84 r8:00000002 r7:60000113 r6:eb2e1d8c r5:8534e000 r4:8534e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8534e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8534e000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8477a680 r8:8027ed34 r7:eb2c1e60 r6:8477a700 r5:8534e000 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: dd499000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:528:4823 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:528 state:D stack:0 pid:4823 tgid:4823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2edd84 r8:00000002 r7:60000113 r6:eb2edd8c r5:85380c00 r4:85380c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85380c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474bc00 r5:00001000 r4:eaddf000 r7:dddced40 r6:83018000 r5:852bff8c r4:84909500 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 800f0013 ffffffff r4:eaeb5dc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:4825 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:4825 tgid:4825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2f5d84 r8:00000002 r7:60000013 r6:eb2f5d8c r5:85382400 r4:85382400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85382400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474bb80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85382400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaceb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bfb8c r4:852bf800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852bfb8c r4:84909580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85382400 r8:849095ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84909580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909580 r8:8027ed34 r7:eb2ede60 r6:8477a800 r5:85382400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f5fb0 to 0xeb2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: dd873000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:4827 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:4827 tgid:4827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb311d84 r8:00000002 r7:60000013 r6:eb311d8c r5:85381800 r4:85381800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85381800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb311e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb045000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85381800 r8:849096ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb311fb0 to 0xeb311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474bac0 INFO: task kworker/0:530:4827 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: dda81000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:4828 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:4828 tgid:4828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb315d84 r8:00000002 r7:60000113 r6:eb315d8c r5:85383000 r4:85383000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85383000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c1280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85383000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cc38c r4:852cc000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852cc38c r4:84909700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85383000 r8:8490972c r7:82804d40 r6:dddced40 r5:dddced60 r4:84909700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909700 r8:8027ed34 r7:eb311e60 r6:8477a900 r5:85383000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474bac0 INFO: task kworker/0:531:4828 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ddcae000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:4830 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:4830 tgid:4830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb31dd84 r8:00000002 r7:60000013 r6:eb31dd8c r5:85380000 r4:85380000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85380000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511b040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85380000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafcb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cc78c r4:852cc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852cc78c r4:84909780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85380000 r8:849097ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84909780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909780 r8:8027ed34 r7:eb311e60 r6:8477a980 r5:85380000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb31dfb0 to 0xeb31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511b0c0 INFO: task kworker/0:532:4830 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ddcae000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:4832 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:4832 tgid:4832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb32dd84 r8:00000002 r7:60000013 r6:eb32dd8c r5:85383c00 r4:85383c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85383c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb32de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511b180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85383c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ccb8c r4:852cc800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ccb8c r4:84909800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85383c00 r8:8490982c r7:82804d40 r6:dddced40 r5:dddced60 r4:84909800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909800 r8:8027ed34 r7:eb311e60 r6:8477aa00 r5:85383c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb32dfb0 to 0xeb32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511b2c0 INFO: task kworker/0:533:4832 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: de317000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:534:4834 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:534 state:D stack:0 pid:4834 tgid:4834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb335d84 r8:00000002 r7:60000113 r6:eb335d8c r5:85384800 r4:85384800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85384800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511b300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85384800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ccf8c r4:852ccc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ccf8c r4:84909880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85384800 r8:849098ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84909880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909880 r8:8027ed34 r7:eb311e60 r6:8477aa80 r5:85384800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb335fb0 to 0xeb335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511b440 INFO: task kworker/0:534:4834 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: de60a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:4836 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:4836 tgid:4836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb33dd84 r8:00000002 r7:60000113 r6:eb33dd8c r5:85385400 r4:85385400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85385400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511b3c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85385400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cd38c r4:852cd000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852cd38c r4:84909900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85385400 r8:8490992c r7:82804d40 r6:dddced40 r5:dddced60 r4:84909900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909900 r8:8027ed34 r7:eb311e60 r6:8477ab00 r5:85385400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb33dfb0 to 0xeb33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511b240 INFO: task kworker/0:535:4836 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: deac3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:536:4838 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:4838 tgid:4838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb345d84 r8:00000002 r7:60000113 r6:eb345d8c r5:85386000 r4:85386000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85386000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511ba00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85386000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb177000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ce78c r4:852ce400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ce78c r4:84909980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85386000 r8:849099ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84909980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909980 r8:8027ed34 r7:eb311e60 r6:8477ab80 r5:85386000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb345fb0 to 0xeb345ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511b680 INFO: task kworker/0:536:4838 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: deac3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:4840 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:4840 tgid:4840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb34dd84 r8:00000002 r7:60000113 r6:eb34dd8c r5:85388c00 r4:85388c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85388c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511b600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85388c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb075000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cdb8c r4:852cd800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852cdb8c r4:84909a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85388c00 r8:84909a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84909a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909a00 r8:8027ed34 r7:eb345e60 r6:8477ac00 r5:85388c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb34dfb0 to 0xeb34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511b400 INFO: task kworker/0:537:4840 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: deac3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:4842 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:4842 tgid:4842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb355d84 r8:00000002 r7:60000113 r6:eb355d8c r5:85388000 r4:85388000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85388000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511b840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85388000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb093000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cdf8c r4:852cdc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852cdf8c r4:84909a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85388000 r8:84909aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84909a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909a80 r8:8027ed34 r7:eb345e60 r6:8477ac80 r5:85388000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb355fb0 to 0xeb355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511b800 INFO: task kworker/0:538:4842 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: dee60000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:4844 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:539 state:D stack:0 pid:4844 tgid:4844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb35dd84 r8:00000002 r7:60000113 r6:eb35dd8c r5:85389800 r4:85389800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85389800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511b940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85389800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb139000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ce38c r4:852ce000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ce38c r4:84909b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85389800 r8:84909b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84909b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909b00 r8:8027ed34 r7:eb345e60 r6:8477ad00 r5:85389800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb35dfb0 to 0xeb35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511b780 INFO: task kworker/0:539:4844 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: df3f0000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:540:4847 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:540 state:D stack:0 pid:4847 tgid:4847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb369d84 r8:00000002 r7:60000113 r6:eb369d8c r5:8538a400 r4:8538a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8538a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472bc80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8538a400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1bb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cf78c r4:852cf400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852cf78c r4:84909b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8538a400 r8:84909bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84909b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909b80 r8:8027ed34 r7:eb345e60 r6:8477ad80 r5:8538a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511b8c0 INFO: task kworker/0:540:4847 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: df3f0000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:4848 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:4848 tgid:4848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb36dd84 r8:00000002 r7:60000013 r6:eb36dd8c r5:8538c800 r4:8538c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8538c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb36de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511bb40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8538c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb181000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ceb8c r4:852ce800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ceb8c r4:84909c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8538c800 r8:84909c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84909c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909c00 r8:8027ed34 r7:eb369e60 r6:8477ae00 r5:8538c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb36dfb0 to 0xeb36dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511ba40 INFO: task kworker/0:541:4848 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: df94f000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:542:4850 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:542 state:D stack:0 pid:4850 tgid:4850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb375d84 r8:00000002 r7:60000113 r6:eb375d8c r5:8538e000 r4:8538e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8538e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb375e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511bc80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8538e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cef8c r4:852cec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852cef8c r4:84909c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8538e000 r8:84909cac r7:82804d40 r6:dddced40 r5:dddced60 r4:84909c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909c80 r8:8027ed34 r7:eb369e60 r6:8477ae80 r5:8538e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb375fb0 to 0xeb375ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511bb80 INFO: task kworker/0:542:4850 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: df94f000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:543:4853 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:543 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb381d84 r8:00000002 r7:60000013 r6:eb381d8c r5:8538ec00 r4:8538ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8538ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb381e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511bdc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8538ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cf38c r4:852cf000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852cf38c r4:84909d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8538ec00 r8:84909d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84909d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909d00 r8:8027ed34 r7:eb369e60 r6:8477af00 r5:8538ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb381fb0 to 0xeb381ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511be00 INFO: task kworker/0:543:4853 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaeb5dc0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 INFO: task kworker/0:544:4856 blocked for more than 456 seconds. Workqueue: events bpf_prog_free_deferred r5:8538bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84909d80 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511bf40 INFO: task kworker/0:544:4856 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e0041000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) r4:84719340 r5:85386c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:84909e00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r5:8524af8c r4:8524ac00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:4858 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:4858 tgid:4858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb395d84 r8:00000002 r7:60000113 r6:eb395d8c r5:8538d400 r4:8538d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8538d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bc000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8538d400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cff8c r4:852cfc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852cff8c r4:84909e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8538d400 r8:84909eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84909e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909e80 r8:8027ed34 r7:eb391e60 r6:851b6080 r5:8538d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bc100 INFO: task kworker/0:546:4858 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e0665000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:547:4861 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:547 state:D stack:0 pid:4861 tgid:4861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3a1d84 r8:00000002 r7:60000013 r6:eb3a1d8c r5:85391800 r4:85391800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85391800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bc3c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85391800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d0b8c r4:852d0800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d0b8c r4:84909f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85391800 r8:84909f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84909f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909f00 r8:8027ed34 r7:eb391e60 r6:851b6100 r5:85391800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a1fb0 to 0xeb3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bc2c0 INFO: task kworker/0:547:4861 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e0c94000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:4864 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:4864 tgid:4864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3b5d84 r8:00000002 r7:60000113 r6:eb3b5d8c r5:85390c00 r4:85390c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85390c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bc340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85390c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d078c r4:852d0400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d078c r4:84909f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85390c00 r8:84909fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84909f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909f80 r8:8027ed34 r7:eb3a1e60 r6:851b6180 r5:85390c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b5fb0 to 0xeb3b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bc300 INFO: task kworker/0:548:4864 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e0c94000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:4865 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:4865 tgid:4865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3bdd84 r8:00000002 r7:60000013 r6:eb3bdd8c r5:85393000 r4:85393000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85393000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bc580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85393000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d0f8c r4:852d0c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d0f8c r4:851b8000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85393000 r8:851b802c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8000 r8:8027ed34 r7:eb3a1e60 r6:851b6200 r5:85393000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3bdfb0 to 0xeb3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bc300 INFO: task kworker/0:549:4865 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e11c1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:4867 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:4867 tgid:4867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3cdd84 r8:00000002 r7:60000113 r6:eb3cdd8c r5:85392400 r4:85392400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85392400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3cde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bc840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85392400 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa29000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d178c r4:852d1400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d178c r4:851b8080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85392400 r8:851b80ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8080 r8:8027ed34 r7:eb3bde60 r6:851b6280 r5:85392400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bc4c0 INFO: task kworker/0:550:4867 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e11c1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:4868 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:4868 tgid:4868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2e5d84 r8:00000002 r7:60000113 r6:eb2e5d8c r5:85280000 r4:85280000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85280000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bc680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85280000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d138c r4:852d1000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d138c r4:851b8100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85280000 r8:851b812c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8100 r8:8027ed34 r7:eb3cde60 r6:851b8180 r5:85280000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e5fb0 to 0xeb2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bc4c0 INFO: task kworker/0:551:4868 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e16b3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:4871 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:552 state:D stack:0 pid:4871 tgid:4871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3d1d84 r8:00000002 r7:60000013 r6:eb3d1d8c r5:85282400 r4:85282400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85282400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bc900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85282400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa59000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d1b8c r4:852d1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d1b8c r4:851b8200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85282400 r8:851b822c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8200 r8:8027ed34 r7:eb3cde60 r6:851b8280 r5:85282400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d1fb0 to 0xeb3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bc980 INFO: task kworker/0:552:4871 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e16b3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:553:4873 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:553 state:D stack:0 pid:4873 tgid:4873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3d9d84 r8:00000002 r7:60000113 r6:eb3d9d8c r5:85390000 r4:85390000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85390000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849747c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85390000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab39000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d278c r4:852d2400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d278c r4:851b8300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85390000 r8:851b832c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8300 r8:8027ed34 r7:eb3d1e60 r6:851b6300 r5:85390000 Exception stack(0xeb3d9fb0 to 0xeb3d9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:553:4873 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e1b28000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:554:4875 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:554 state:D stack:0 pid:4875 tgid:4875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2e9d84 r8:00000002 r7:60000013 r6:eb2e9d8c r5:85283c00 r4:85283c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85283c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bca40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85283c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff6d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d1f8c r4:852d1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d1f8c r4:851b8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85283c00 r8:851b83ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8380 r8:8027ed34 r7:eb3d9e60 r6:851b8400 r5:85283c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bcbc0 INFO: task kworker/0:554:4875 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e2082000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r4:eaeb5dc0 r5:00001000 r4:eadb5000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85283000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85283000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0801000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d238c r4:852d2000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d238c r4:851b8480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85283000 r8:851b84ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8480 r8:8027ed34 r7:eb3d9e60 r6:851b8500 r5:85283000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3ddfb0 to 0xeb3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bcc00 INFO: task kworker/0:555:4877 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e2082000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85286000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85361040 r5:852d2b8c r4:852d2800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d2b8c r4:851b8580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85286000 r8:851b85ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8580 r8:8027ed34 r7:eb3d9e60 r6:851b8600 r5:85286000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84974580 INFO: task kworker/0:556:4880 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e2082000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:557:4882 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:557 state:D stack:0 pid:4882 tgid:4882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3e5d84 r8:00000002 r7:60000013 r6:eb3e5d8c r5:85286c00 r4:85286c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85286c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853615c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85286c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d338c r4:852d3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d338c r4:851b8680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:851b8680 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:557:4882 is blocked on a mutex likely owned by task kworker/1:273:4493. [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e25e1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:558:4883 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:558 state:D stack:0 pid:4883 tgid:4883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3d5d84 r8:00000002 r7:60000013 r6:eb3d5d8c r5:85284800 r4:85284800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85284800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853612c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85284800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d2f8c r4:852d2c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d2f8c r4:851b8780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85284800 r8:851b87ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8780 r8:8027ed34 r7:eb3e5e60 r6:851b8800 r5:85284800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:eaeb5dc0 r4:00000000 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b79e80 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:559:4887 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:559 state:D stack:0 pid:4887 tgid:4887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3edd84 r8:00000002 r7:60000013 r6:eb3edd8c r5:85285400 r4:85285400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85285400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85361680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85285400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d378c r4:852d3400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d378c r4:851b8880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85285400 r8:851b88ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8880 r8:8027ed34 r7:eb3e5e60 r6:851b8900 r5:85285400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85361480 INFO: task kworker/0:559:4887 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e2b1a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eb209d84 r8:00000002 r7:60000113 r6:eb209d8c r5:85394800 r4:85394800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85394800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85394800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf13000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d3b8c r4:852d3800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d3b8c r4:851b6380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85394800 r8:851b63ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851b6380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b6380 r8:8027ed34 r7:eb2c1e60 r6:851b6400 r5:85394800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb209fb0 to 0xeb209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85364100 INFO: task kworker/1:322:4888 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85395400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:852d3f8c r4:852d3c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:853616c0 r4:00000000 r4:82ac11e4 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:561:4892 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3fdd84 r8:00000002 r7:60000013 r6:eb3fdd8c r5:85396000 r5:85396000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df080 r7:dddced40 r6:83018000 r5:853f9b8c r4:851b8a00 Exception stack(0xeb3fdfb0 to 0xeb3fdff8) r4:85361a80 INFO: task kworker/0:561:4892 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e30a7000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 r5:85396c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:800f0013 r4:80239bd0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:324:4897 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:324 state:D stack:0 pid:4897 tgid:4897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb40dd84 r8:00000002 r7:60000113 r6:eb40dd8c r5:85393c00 r4:85393c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85393c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364640 r4:851b6680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:61c88647 r9:8538b000 r8:851b8aac r7:82804d40 r6:dddced40 r5:dddced60 Call trace: Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e3d3d000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84719340 Workqueue: events bpf_prog_free_deferred r5:84570000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df000 r10:61c88647 r9:84570000 r8:851b682c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d60: 800f0013 ffffffff r4:00000000 r5:8524af8c r4:8524ac00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:84570c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:851b8b00 r8:8027ed34 r7:eb3fde60 r6:851b6900 r5:84570c00 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaeb5dc0 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84572400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364ec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84572400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb275000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85316b8c r4:85316800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85316b8c r4:851b6980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84572400 r8:851b69ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851b6980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b6980 r8:8027ed34 r7:eb419e60 r6:851b6a00 r5:84572400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb435fb0 to 0xeb435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85364a00 INFO: task kworker/1:326:4904 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e4238000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84573c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f8b8c r4:853f8800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853f8b8c r4:851b8b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84573c00 r8:851b8bac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8b80 r8:8027ed34 r7:eb3fde60 r6:851b6a80 r5:84573c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb43dfb0 to 0xeb43dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84571800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84974800 r7:dddced40 r6:83018000 r5:853f8f8c r4:851b8c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84574800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb445e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84574800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb269000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f978c r4:853f9400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853f978c r4:851b8c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84574800 r8:851b8cac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8c80 r8:8027ed34 r7:eb3fde60 r6:851b6b80 r5:84574800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb445fb0 to 0xeb445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85361440 INFO: task kworker/0:566:4909 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e500e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:327:4913 blocked for more than 456 seconds. r5:84575400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb415e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:851b6c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b6c00 r8:8027ed34 r7:eb435e60 r6:851b6c80 r5:84575400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb415fb0 to 0xeb415ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85364e80 INFO: task kworker/1:327:4913 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e500e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:567:4915 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:567 state:D stack:0 pid:4915 tgid:4915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb439d84 r8:00000002 r7:60000113 r6:eb439d8c r5:84576000 r4:84576000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84576000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84576000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fa38c r4:853fa000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853fa38c r4:851b8d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84576000 r8:851b8d2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r5:00001000 r4:eadb5000 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:4919 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:4919 tgid:4919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb451d84 r8:00000002 r7:60000113 r6:eb451d8c r5:85398000 r4:85398000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85398000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb451e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85398000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb46b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853faf8c r4:853fac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853faf8c r4:851b8e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85398000 r8:851b8e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8e00 r8:8027ed34 r7:eb439e60 r6:851b6e00 r5:85398000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb451fb0 to 0xeb451ff8) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaeb5d20 to 0xeaeb5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:85399800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r10:00000000 r9:851b8e80 r8:8027ed34 r7:eb451e60 r6:851b6e80 r5:85399800 r4:851df640 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:eaeb5dc0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:571:4922 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:4922 tgid:4922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb465d84 r8:00000002 r7:60000113 r6:eb465d8c r5:8539a400 r4:8539a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8539a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8539a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb429000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fab8c r4:853fa800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853fab8c r4:851b8f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8539a400 r8:851b8f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b8f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8f00 r8:8027ed34 r7:eb451e60 r6:851b6f00 r5:8539a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb465fb0 to 0xeb465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851df5c0 INFO: task kworker/0:571:4922 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e5ea8000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:572:4924 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:572 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb475d84 r8:00000002 r7:60000113 r6:eb475d8c r5:85398c00 r4:85398c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb475fb0 to 0xeb475ff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:573:4926 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:573 state:D stack:0 pid:4926 tgid:4926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb47dd84 r8:00000002 r7:60000113 r6:eb47dd8c r5:8539c800 r4:8539c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8539c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb47de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dfac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8539c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb471000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fb38c r4:853fb000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853fb38c r4:851a9000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8539c800 r8:851a902c r7:82804d40 r6:dddced40 r5:dddced60 r4:851a9000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a9000 r8:8027ed34 r7:eb475e60 r6:85366000 r5:8539c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb47dfb0 to 0xeb47dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:84719340 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:8539b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 r10:00000000 r9:85366080 r8:8027ed34 r7:eb415e60 r6:85366100 r5:8539b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535f2c0 INFO: task kworker/1:328:4927 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e64b7000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:574:4929 blocked for more than 457 seconds. task:kworker/0:574 state:D stack:0 pid:4929 tgid:4929 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08 r9:83018005 r8:8539bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 r4:851a9080 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:eaeb5dc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851a9100 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:4934 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:4934 tgid:4934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4b5d84 r8:00000002 r7:60000113 r6:eb4b5d8c r5:8539ec00 r4:8539ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8539ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dfe80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8539ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fc38c r4:853fc000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853fc38c r4:851a9180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8539ec00 r8:851a91ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851a9180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a9180 r8:8027ed34 r7:eb495e60 r6:85366280 r5:8539ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b5fb0 to 0xeb4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851dfd80 INFO: task kworker/0:576:4934 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e7012000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:577:4937 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:577 state:D stack:0 pid:4937 tgid:4937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:853a0c00 r4:853a0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536b580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fd78c r4:853fd400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853fd78c r4:851a9200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a0c00 r8:851a922c r7:82804d40 r6:dddced40 r5:dddced60 r4:851a9200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a9200 r8:8027ed34 r7:eb495e60 r6:85366300 r5:853a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4cdfb0 to 0xeb4cdff8) dfa0: 00000000 00000000 00000000 00000000 r4:8536b0c0 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:82ac11e4 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:84719340 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4d1d84 r8:00000002 r7:60000013 r6:eb4d1d8c r5:853a1800 r4:853a1800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536b000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fcb8c r4:853fc800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853fcb8c r4:851a9280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a1800 r8:851a92ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851a9280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a9280 r8:8027ed34 r7:eb4cde60 r6:85366380 r5:853a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8536b0c0 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:4940 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:853a3000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e1e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851a9300 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8536b240 INFO: task kworker/0:579:4940 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e79f8000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) r4:84719340 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb421e08 r5:853fd38c r4:853fd000 Exception stack(0xeb421fb0 to 0xeb421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8536b180 INFO: task kworker/0:580:4942 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e79f8000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:4944 blocked for more than 457 seconds. r4:85281800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8536b600 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 5d20: e7a72000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:84719340 Workqueue: events bpf_prog_free_deferred r4:853a0000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:853a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 r5:853fdf8c r4:853fdc00 r7:dddced40 r6:83018000 r5:853fdf8c r4:851a9580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a0000 r8:851a95ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851a9580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a9580 r8:8027ed34 r7:eb4ede60 r6:85366480 r5:853a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb50dfb0 to 0xeb50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8536b600 INFO: task kworker/0:583:4948 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e859c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a5400 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:8536b8c0 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r5:8524af8c r4:8524ac00 r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a6000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851a9780 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e8c5a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:4953 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:329 state:D stack:0 pid:4953 tgid:4953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb525d84 r8:00000002 r7:60000113 r6:eb525d8c r5:853a4800 r4:853a4800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85495c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542438c r4:85424000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8542438c r4:85366600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a4800 r8:8536662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85366600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85366600 r8:8027ed34 r7:eb415e60 r6:85366680 r5:853a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb525fb0 to 0xeb525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535f400 INFO: task kworker/1:329:4953 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e8f93000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:586 state:D stack:0 pid:4955 tgid:4955 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeb539fb0 to 0xeb539ff8) r4:8536ba00 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e92fd000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:587 state:D stack:0 pid:4957 tgid:4957 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe15000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fef8c r4:853fec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853fef8c r4:851a9880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a3c00 r8:851a98ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851a9880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a9880 r8:8027ed34 r7:eb51de60 r6:85366780 r5:853a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 r4:8536bb40 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:4960 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb53dd84 r8:00000002 r7:60000013 r6:eb53dd8c r5:85431800 r4:85431800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85431800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536bec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85431800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa95000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ffb8c r4:853ff800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853ffb8c r4:851a9900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85431800 r8:851a992c r7:82804d40 r6:dddced40 r5:dddced60 r4:851a9900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a9900 r8:8027ed34 r7:eb51de60 r6:851a9980 r5:85431800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb53dfb0 to 0xeb53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535fec0 INFO: task kworker/0:589:4961 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e99f8000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:4964 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:4964 tgid:4964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb16dd84 r8:00000002 r7:60000113 r6:eb16dd8c r5:85433000 r4:85433000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85433000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a44040 r5:853fff8c r4:853ffc00 r10:00000000 r9:851a9b00 r8:8027ed34 r7:eb53de60 r6:851a9b80 r5:85433000 r4:84a44000 Workqueue: events bpf_prog_free_deferred 5d20: e99f8000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018005 r8:85433c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 r7:dddced40 r6:83018000 r5:8540038c r4:851a9c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85433c00 r8:851a9c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851a9c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a9c00 r8:8027ed34 r7:eb16de60 r6:851a9c80 r5:85433c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a44300 INFO: task kworker/0:591:4967 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: e9c9c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 r5:8524af8c r4:8524ac00 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:00001000 r4:eadb5000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85400f8c r4:85400c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85400f8c r4:851a9e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85435400 r8:851a9e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851a9e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a9e00 r8:8027ed34 r7:eb2b9e60 r6:851a9e80 r5:85435400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb319fb0 to 0xeb319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a44380 INFO: task kworker/0:593:4970 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ea033000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:594:4972 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb361d84 r8:00000002 r7:60000013 r6:eb361d8c r5:85436000 r4:85436000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85436000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb361e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a44540 r5:00001000 r4:eaca3000 1fa0: 00000000 00000000 00000000 00000000 5d60: 800f0013 ffffffff r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85436c00 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xeb365fb0 to 0xeb365ff8) r4:00000000 r4:eaeb5dc0 r5:8524af8c r4:8524ac00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r5:85430c00 r4:829187f0 r4:00000000 r7:dddced40 r6:83018000 r5:8540238c r4:8546a100 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ea99a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08 r4:8546a200 r4:84a44740 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ea99a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:8524af8c r4:8524ac00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84848000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb003000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85401b8c r4:85401800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85401b8c r4:8546a300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84848000 r8:8546a32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8546a300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r5:00001000 r4:eadb5000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaeb5d20 to 0xeaeb5d68) r5:8524af8c r4:8524ac00 r4:00000001 INFO: task kworker/0:600:4984 blocked for more than 457 seconds. r9:83018005 r8:8484a400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540278c r4:85402400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8540278c r4:8546a500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484a400 r8:8546a52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8546a500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546a500 r8:8027ed34 r7:eb379e60 r6:8546a580 r5:8484a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb541fb0 to 0xeb541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a44ec0 INFO: task kworker/0:600:4984 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: eb2ea000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8484bc00 r4:829187f0 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb545fb0 to 0xeb545ff8) r4:00000000 r4:eaeb5dc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r5:00001000 r4:eb171000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5d20 to 0xeaeb5d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:603:4990 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:603 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb54dd84 r8:00000002 r7:60000013 r6:eb54dd8c r5:8484d400 r4:8484d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8484d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854736c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8484d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb195000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540338c r4:85403000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8540338c r4:8546a800 r4:8546a800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:8546a900 r4:85473680 5d20: ebbb5000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:605:4994 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb551d84 r8:00000002 r7:60000013 r6:eb551d8c r5:8484e000 r4:8484e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8484e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85473980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8484e000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85403b8c r4:85403800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85403b8c r4:8546aa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484e000 r8:8546aa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8546aa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546aa00 r8:8027ed34 r7:eb389e60 r6:8546aa80 r5:8484e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85473740 INFO: task kworker/0:605:4994 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ec3a3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:4996 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:4996 tgid:4996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb559d84 r8:00000002 r7:60000113 r6:eb559d8c r5:8484b000 r4:8484b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8484b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85478200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8484b000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb329000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8546ab00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:8546ac00 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85473bc0 INFO: task kworker/0:607:4997 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ec9cb000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:4999 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:608 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb561d84 r8:00000002 r7:60000013 r6:eb561d8c r5:85439800 r4:85439800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85439800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85473f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85439800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85439800 r8:8546ad2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:609:5003 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:609 state:D stack:0 pid:5003 tgid:5003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb565d84 r8:00000002 r7:60000013 r6:eb565d8c r5:8543b000 r4:8543b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8543b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb565e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a44c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8543b000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541078c r4:85410400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8541078c r4:8546ae00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ece2e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:00000000 r8:83259800 r7:83259800 r6:00000002 r5:82a6f144 r4:00000004 [<83259804>] (0x83259804) from [] (0xeaeb5ea4) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:610:5005 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:610 state:D stack:0 pid:5005 tgid:5005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb555d84 r8:00000002 r7:60000013 r6:eb555d8c r5:8543bc00 r4:8543bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8543bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85478000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8543bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85410b8c r4:85410800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85410b8c r4:8546af00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:851e4ec0 task:kworker/0:611 state:D stack:0 pid:5008 tgid:5008 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8541138c r4:85477000 Exception stack(0xeb569fb0 to 0xeb569ff8) Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 r5:85a50b8c r4:85a50800 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:851e4ec0 task:kworker/0:612 state:D stack:0 pid:5009 tgid:5009 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8541178c r4:85411400 r10:00000000 r9:85477100 r8:8027ed34 r7:eb569e60 r6:85477180 r5:8543d400 r4:85478580 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7f701000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:613:5011 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:613 state:D stack:0 pid:5011 tgid:5011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb571d84 r8:00000002 r7:60000113 r6:eb571d8c r5:8543e000 r4:8543e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8543e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85478600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8543e000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb34f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85411b8c r4:85411800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85411b8c r4:85477200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543e000 r8:8547722c r7:82804d40 r6:dddced40 r5:dddced60 r4:85477200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477200 r8:8027ed34 r7:eb56de60 r6:85477280 r5:8543e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb571fb0 to 0xeb571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85478400 INFO: task kworker/0:613:5011 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7f701000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:614:5013 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:614 state:D stack:0 pid:5013 tgid:5013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb575d84 r8:00000002 r7:60000013 r6:eb575d8c r5:8543ec00 r4:8543ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8543ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85478e40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8543ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3af000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85412b8c r4:85412800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85412b8c r4:85477300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543ec00 r8:8547732c r7:82804d40 r6:dddced40 r5:dddced60 r4:85477300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477300 r8:8027ed34 r7:eb571e60 r6:85477380 r5:8543ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb575fb0 to 0xeb575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85478680 INFO: task kworker/0:614:5013 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7f701000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb57dfb0 to 0xeb57dff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a50b8c r4:85a50800 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:5016 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:5016 tgid:5016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb581d84 r8:00000002 r7:60000013 r6:eb581d8c r5:8484ec00 r4:8484ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8484ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85478a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8484ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541238c r4:85412000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8541238c r4:85477500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484ec00 r8:8547752c r7:82804d40 r6:dddced40 r5:dddced60 r4:85477500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477500 r8:8027ed34 r7:eb575e60 r6:85477580 r5:8484ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb581fb0 to 0xeb581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85478ac0 INFO: task kworker/0:616:5016 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7f701000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r4:82ac11e4 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85440000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb585e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85478c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85440000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541278c r4:85412400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8541278c r4:85477600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85440000 r8:8547762c r7:82804d40 r6:dddced40 r5:dddced60 r4:85477600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477600 r8:8027ed34 r7:eb575e60 r6:85477680 r5:85440000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb585fb0 to 0xeb585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85478840 INFO: task kworker/0:617:5019 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7f701000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:618:5020 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:618 state:D stack:0 pid:5020 tgid:5020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb589d84 r8:00000002 r7:60000013 r6:eb589d8c r5:85441800 r4:85441800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85441800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85483040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85441800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85412f8c r4:85412c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85412f8c r4:85477700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85441800 r8:8547772c r7:82804d40 r6:dddced40 r5:dddced60 r4:85477700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477700 r8:8027ed34 r7:eb575e60 r6:85477780 r5:85441800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb589fb0 to 0xeb589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85478f80 INFO: task kworker/0:618:5020 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7f701000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:5023 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:5023 tgid:5023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb58dd84 r8:00000002 r7:60000113 r6:eb58dd8c r5:85442400 r4:85442400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85442400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb58de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854832c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85442400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541338c r4:85413000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8541338c r4:85477800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85442400 r8:8547782c r7:82804d40 r6:dddced40 r5:dddced60 r4:85477800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477800 r8:8027ed34 r7:eb589e60 r6:85477880 r5:85442400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb58dfb0 to 0xeb58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85483140 INFO: task kworker/0:619:5023 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7f701000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:620:5025 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:620 state:D stack:0 pid:5025 tgid:5025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb599d84 r8:00000002 r7:60000113 r6:eb599d8c r5:85443c00 r4:85443c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85443c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854834c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85443c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb595000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541378c r4:85413400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8541378c r4:85477900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85443c00 r8:8547792c r7:82804d40 r6:dddced40 r5:dddced60 r4:85477900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477900 r8:8027ed34 r7:eb58de60 r6:85477980 r5:85443c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb599fb0 to 0xeb599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:621:5027 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:621 state:D stack:0 pid:5027 tgid:5027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb579d84 r8:00000002 r7:60000113 r6:eb579d8c r5:85440c00 r4:85440c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85440c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85483580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85440c00 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa41000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85413b8c r4:85413800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85413b8c r4:85477a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85440c00 r8:85477a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85477a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477a00 r8:8027ed34 r7:eb599e60 r6:85477a80 r5:85440c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb579fb0 to 0xeb579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85483480 INFO: task kworker/0:621:5027 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) r4:82ac11e4 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85444800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85413f8c r4:85477b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85444800 r8:85477b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85477b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477b00 r8:8027ed34 r7:eb579e60 r6:85477b80 r5:85444800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a1fb0 to 0xeb5a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854835c0 INFO: task kworker/0:622:5029 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:623 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb485d84 r8:00000002 r7:60000013 r6:eb485d8c r5:85445400 r4:85445400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85445400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85483a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85445400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0791000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541c38c r4:8541c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8541c38c r4:85477c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85445400 r8:85477c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85477c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477c00 r8:8027ed34 r7:eb5a1e60 r6:85477c80 r5:85445400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb485fb0 to 0xeb485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85483780 INFO: task kworker/0:623:5031 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7f701000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:85446000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8541c78c r4:85477d00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7f701000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85446c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb499e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85483c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85446c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead23000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541cb8c r4:8541c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8541cb8c r4:85477e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85446c00 r8:85477e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85477e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477e00 r8:8027ed34 r7:eb4ade60 r6:85477e80 r5:85446c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb499fb0 to 0xeb499ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85483b00 INFO: task kworker/0:625:5035 is blocked on a mutex likely owned by task kworker/0:416:4498. 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:626:5038 blocked for more than 458 seconds. r5:853ad400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 90070013 ffffffff r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:627:5039 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:627 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb515d84 r8:00000002 r7:60000013 r6:eb515d8c r5:853a9800 r4:853a9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 90070013 ffffffff r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:851e4ec0 task:kworker/0:628 state:D stack:0 pid:5040 tgid:5040 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853ae000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8541d38c r4:8541d000 r4:8548d000 r10:00000000 r9:8548d000 r8:8027ed34 r7:eb515e60 r6:85366900 r5:853ae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a5fb0 to 0xeb5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85358740 INFO: task kworker/0:628:5040 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:629:5043 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:629 state:D stack:0 pid:5043 tgid:5043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eb5add84 r8:00000002 r7:60000113 r6:eb5add8c r5:853ac800 r5:853ac800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ade08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541e78c r4:8541e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8541e78c r4:8548d080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ac800 r8:8548d0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8548d080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548d080 r8:8027ed34 r7:eb515e60 r6:85366980 r5:853ac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5adfb0 to 0xeb5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85490280 INFO: task kworker/0:629:5043 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/0:630:5044 blocked for more than 458 seconds. r5:853ab000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85490140 r10:61c88647 r9:853ab000 r8:8548d12c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:630:5044 is blocked on a mutex likely owned by task kworker/0:416:4498. r5:90070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:631:5046 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:631 state:D stack:0 pid:5046 tgid:5046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5b9d84 r8:00000002 r7:60000013 r6:eb5b9d8c r5:853aa400 r4:853aa400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853aa400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85490300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf7d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541df8c r4:8541dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8541df8c r4:8548d180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853aa400 r8:8548d1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8548d180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548d180 r8:8027ed34 r7:eb5ade60 r6:85366a80 r5:853aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b9fb0 to 0xeb5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85490100 INFO: task kworker/0:631:5046 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:632:5048 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:632 state:D stack:0 pid:5048 tgid:5048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5c1d84 r8:00000002 r7:60000113 r6:eb5c1d8c r5:853aec00 r4:853aec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853aec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85490400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0fb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541e38c r4:8541e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8541e38c r4:8548d200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853aec00 r8:8548d22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8548d200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548d200 r8:8027ed34 r7:eb5ade60 r6:85366b00 r5:853aec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c1fb0 to 0xeb5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85490540 INFO: task kworker/0:632:5048 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:853a8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8541eb8c r4:8541e800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:634 state:D stack:0 pid:5053 tgid:5053 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853abc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85490840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541ef8c r4:8541ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8541ef8c r4:8548d300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853abc00 r8:8548d32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8548d300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548d300 r8:8027ed34 r7:eb5c9e60 r6:85366c00 r5:853abc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85490580 INFO: task kworker/0:634:5053 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:635:5056 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:635 state:D stack:0 pid:5056 tgid:5056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4fdd84 r8:00000002 r7:60000013 r6:eb4fdd8c r5:85443000 r4:85443000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85443000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4fde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85490ac0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85443000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541f78c r4:8541f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8541f78c r4:8548d380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85443000 r8:8548d3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8548d380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548d380 r8:8027ed34 r7:eb5d5e60 r6:8548d400 r5:85443000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85490780 INFO: task kworker/0:635:5056 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:8543a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8548d480 r8:8027ed34 r7:eb4fde60 r6:8548d500 r5:8543a400 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84580000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85490b80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84580000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb297000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84580000 r8:8548d5ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:00001000 r4:ecc4f000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:638:5061 blocked for more than 458 seconds. r5:84580c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5dde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8548d680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548d680 r8:8027ed34 r7:eb5d9e60 r6:8548d700 r5:84580c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5ddfb0 to 0xeb5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85490bc0 INFO: task kworker/0:638:5061 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84581800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85483d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84581800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb453000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542478c r4:85424400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542478c r4:8548d780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84581800 r8:8548d7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8548d780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548d780 r8:8027ed34 r7:eb5dde60 r6:8548d800 r5:84581800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e9fb0 to 0xeb5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85490bc0 INFO: task kworker/0:639:5062 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:640:5066 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred r5:84582400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca000 r7:dddced40 r6:83018000 r5:85424b8c r4:8548d880 Exception stack(0xeb5e5fb0 to 0xeb5e5ff8) r4:853580c0 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:641:5068 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:641 state:D stack:0 pid:5068 tgid:5068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5edd84 r8:00000002 r7:60000113 r6:eb5edd8c r5:84583000 r4:84583000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84583000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ede08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84583000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb46d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85424f8c r4:85424c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85424f8c r4:8548d980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84583000 r8:8548d9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8548d980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548d980 r8:8027ed34 r7:eb5dde60 r6:8548da00 r5:84583000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5edfb0 to 0xeb5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ca2c0 INFO: task kworker/0:641:5068 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:642 state:D stack:0 pid:5071 tgid:5071 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84583c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca480 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb48d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542578c r4:85425400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542578c r4:8548da80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84583c00 r8:8548daac r7:82804d40 r6:dddced40 r5:dddced60 r4:8548da80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548da80 r8:8027ed34 r7:eb5dde60 r6:8548db00 r5:84583c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ca380 INFO: task kworker/0:642:5071 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:643:5073 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:643 state:D stack:0 pid:5073 tgid:5073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5f9d84 r8:00000002 r7:60000113 r6:eb5f9d8c r5:84584800 r4:84584800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84584800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f9e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85425b8c r4:85425800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85425b8c r4:8548db80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84584800 r8:8548dbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8548db80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548db80 r8:8027ed34 r7:eb5f1e60 r6:8548dc00 r5:84584800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f9fb0 to 0xeb5f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 9d60: 90070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851e4ec0 task:kworker/0:644 state:D stack:0 pid:5075 tgid:5075 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84585400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84585400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4af000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85425f8c r4:85425c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85425f8c r4:8548dc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84585400 r8:8548dcac r7:82804d40 r6:dddced40 r5:dddced60 r4:8548dc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548dc80 r8:8027ed34 r7:eb5f9e60 r6:8548dd00 r5:84585400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5fdfb0 to 0xeb5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ca540 INFO: task kworker/0:644:5075 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:645 state:D stack:0 pid:5077 tgid:5077 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853a6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:853a6c00 r8:8548ddac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:853a8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c3180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85317f8c r4:85317c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85317f8c r4:85366d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a8000 r8:85366d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85366d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85366d00 r8:8027ed34 r7:eb415e60 r6:85366d80 r5:853a8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb605fb0 to 0xeb605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85495800 INFO: task kworker/1:330:5078 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:331:5080 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:331 state:D stack:0 pid:5080 tgid:5080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb60dd84 r8:00000002 r7:60000113 r6:eb60dd8c r5:85450000 r4:85450000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85450000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c39c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85450000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8542938c r4:85429000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85495800 INFO: task kworker/1:331:5080 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85450c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:85a50b8c r4:85a50800 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:647 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85451800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548de80 r8:8027ed34 r7:eb611e60 r6:85366f80 r5:85451800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb615fb0 to 0xeb615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ca880 INFO: task kworker/0:647:5083 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:648:5086 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:648 state:D stack:0 pid:5086 tgid:5086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb621d84 r8:00000002 r7:60000113 r6:eb621d8c r5:85453c00 r5:85453c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84777980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85453c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb643000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85427b8c r4:85427800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85427b8c r4:8548df00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85453c00 r8:8548df2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8548df00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548df00 r8:8027ed34 r7:eb615e60 r6:848c1000 r5:85453c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb621fb0 to 0xeb621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851cac00 INFO: task kworker/0:648:5086 is blocked on a mutex likely owned by task kworker/0:416:4498. Exception stack(0xeaec9d20 to 0xeaec9d68) 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85454800 r5:85454800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cad40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85454800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb507000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85426f8c r4:85426c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85426f8c r4:8548df80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85454800 r8:8548dfac r7:82804d40 r6:dddced40 r5:dddced60 r4:8548df80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d60: 90070013 ffffffff r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85453000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cae80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85453000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb529000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542738c r4:85427000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542738c r4:85122000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85453000 r8:8512202c r7:82804d40 r6:dddced40 r5:dddced60 r4:85122000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85122000 r8:8027ed34 r7:eb621e60 r6:848c1100 r5:85453000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851cad00 INFO: task kworker/0:650:5089 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:85452400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85495240 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:85456c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a00000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85456c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb649000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85427f8c r4:85427c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85427f8c r4:85122100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85456c00 r8:8512212c r7:82804d40 r6:dddced40 r5:dddced60 r4:85122100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85122100 r8:8027ed34 r7:eb621e60 r6:848c1200 r5:85456c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb641fb0 to 0xeb641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85495a80 INFO: task kworker/0:652:5093 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:653:5096 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:653 state:D stack:0 pid:5096 tgid:5096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb655d84 r8:00000002 r7:60000013 r6:eb655d8c r5:85456000 r4:85456000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85456000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb661000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542878c r4:85428400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542878c r4:85122180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85456000 r8:851221ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85122180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85122180 r8:8027ed34 r7:eb641e60 r6:848c1280 r5:85456000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a00100 INFO: task kworker/0:653:5096 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a50b8c r4:85a50800 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:654 state:D stack:0 pid:5097 tgid:5097 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853b0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:853b1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb671000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85428f8c r4:85428c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85428f8c r4:85122280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b1800 r8:851222ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85122280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85122280 r8:8027ed34 r7:eb655e60 r6:848c1380 r5:853b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb675fb0 to 0xeb675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a00340 INFO: task kworker/0:655:5100 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:656 state:D stack:0 pid:5101 tgid:5101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb601d84 r8:00000002 r7:60000013 r6:eb601d8c r5:84586000 r4:84586000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84586000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a00400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84586000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb66b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85428b8c r4:85428800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85428b8c r4:85122300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84586000 r8:8512232c r7:82804d40 r6:dddced40 r5:dddced60 r4:85122300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85122300 r8:8027ed34 r7:eb675e60 r6:85122380 r5:84586000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a00340 INFO: task kworker/0:656:5101 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85458000 r5:85458000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a00900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85458000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa69000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542978c r4:85429400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542978c r4:85122400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85458000 r8:8512242c r7:82804d40 r6:dddced40 r5:dddced60 r4:85122400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85122400 r8:8027ed34 r7:eb675e60 r6:85122480 r5:85458000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f5fb0 to 0xeb5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a007c0 INFO: task kworker/0:657:5104 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:ecc4f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85459800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a00c00 r10:61c88647 r9:85459800 r8:8512252c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eb68dd84 r8:00000002 r7:60000013 r6:eb68dd8c r5:85458c00 r5:85458c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525d040 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542a78c r4:8542a400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542a78c r4:85122600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85458c00 r8:8512262c r7:82804d40 r6:dddced40 r5:dddced60 r4:85122600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85122600 r8:8027ed34 r7:eb689e60 r6:85122680 r5:85458c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb68dfb0 to 0xeb68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a00800 INFO: task kworker/0:659:5108 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:660 state:D stack:0 pid:5111 tgid:5111 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8545b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a00d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8545b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa7d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85429f8c r4:85429c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85429f8c r4:85122700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8545b000 r8:8512272c r7:82804d40 r6:dddced40 r5:dddced60 r4:85122700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85122700 r8:8027ed34 r7:eb68de60 r6:85122780 r5:8545b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:660:5111 is blocked on a mutex likely owned by task kworker/0:416:4498. 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8545bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:5115 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:662 state:D stack:0 pid:5115 tgid:5115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb69dd84 r8:00000002 r7:60000013 r6:eb69dd8c r5:8545a400 r4:8545a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8545a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525d580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8545a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a50b8c r4:85a50800 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8545c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525d2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8545c800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542ab8c r4:8542a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542ab8c r4:85122a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8545c800 r8:85122a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85122a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85122a00 r8:8027ed34 r7:eb69de60 r6:85122a80 r5:8545c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a1fb0 to 0xeb6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8525d080 INFO: task kworker/0:663:5118 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:332 state:D stack:0 pid:5119 tgid:5119 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853b2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb669e08 r9:83018205 r8:853b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r7:ddde2d40 r6:83018200 r5:85317b8c r4:848c1400 Exception stack(0xeb669fb0 to 0xeb669ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:664:5120 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:664 state:D stack:0 pid:5120 tgid:5120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb685d84 r8:00000002 r7:60000013 r6:eb685d8c r5:853b3000 r4:853b3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853b3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525d4c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafdd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542af8c r4:8542ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542af8c r4:85122b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b3000 r8:85122b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85122b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85122b00 r8:8027ed34 r7:eb69de60 r6:848c1500 r5:853b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb685fb0 to 0xeb685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8525d600 INFO: task kworker/0:664:5120 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:90070013 r4:80239bd0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:665:5124 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:665 state:D stack:0 pid:5124 tgid:5124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6b1d84 r8:00000002 r7:60000013 r6:eb6b1d8c r5:853b6000 r4:853b6000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853b6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525d700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb081000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8545e000 r5:8545e000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525da40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8545e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542bf8c r4:8542bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542bf8c r4:85122c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8545e000 r8:85122c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85122c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85122c00 r8:8027ed34 r7:eb6b1e60 r6:85122c80 r5:8545e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb699fb0 to 0xeb699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8525d680 INFO: task kworker/0:666:5125 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8545ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8545ec00 r8:85122d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8545d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525dd80 r7:dddced40 r6:83018000 r5:854d078c r4:85122e00 r10:00000000 r9:85122e00 r8:8027ed34 r7:eb699e60 r6:85122e80 r5:8545d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6adfb0 to 0xeb6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8525da00 INFO: task kworker/0:668:5129 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:669:5131 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:669 state:D stack:0 pid:5131 tgid:5131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6b9d84 r8:00000002 r7:60000113 r6:eb6b9d8c r5:8539e000 r4:8539e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8539e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525db40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8539e000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8539e000 r8:85122f2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:90070013 r4:80239bd0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:85455400 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85455400 r8:851dc02c r7:82804d40 r6:dddced40 r5:dddced60 r4:851dc000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dc000 r8:8027ed34 r7:eb6ade60 r6:851dc080 r5:85455400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6bdfb0 to 0xeb6bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8525dd40 INFO: task kworker/0:670:5133 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:5134 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:671 state:D stack:0 pid:5134 tgid:5134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6b5d84 r8:00000002 r7:60000113 r6:eb6b5d8c r5:85460000 r4:85460000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85460000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525de80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85460000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d0b8c r4:854d0800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d0b8c r4:851dc100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:851dc100 r8:8027ed34 r7:eb6bde60 r6:851dc180 r5:85460000 Workqueue: events bpf_prog_free_deferred 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:672:5138 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:672 state:D stack:0 pid:5138 tgid:5138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85460c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 Not tainted 6.15.0-syzkaller #0 r5:85461800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dda40 r7:dddced40 r6:83018000 r5:854d1b8c r4:851dc300 dfa0: 00000000 00000000 00000000 00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:333:5142 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:333 state:D stack:0 pid:5142 tgid:5142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6d5d84 r8:00000002 r7:60000113 r6:eb6d5d8c r5:85463c00 r4:85463c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85463c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85118fc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85463c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb743000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e878c r4:847e8400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e878c r4:848c1600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85463c00 r8:848c162c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c1600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1600 r8:8027ed34 r7:eb605e60 r6:851dc400 r5:85463c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d5fb0 to 0xeb6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85118000 INFO: task kworker/1:333:5142 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:334:5144 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r5:85464800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85118140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85464800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb371000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d178c r4:854d1400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854d178c r4:848c1680 r4:848c1680 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:85a50b8c r4:85a50800 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:829187f4 r9:eb6ddd84 r8:00000002 r7:60000013 r6:eb6ddd8c r5:85463000 r4:85463000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85463000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6dde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85118040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85463000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb351000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e8f8c r4:847e8c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847e8f8c r4:851dc500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85463000 r8:851dc52c r7:82804d40 r6:dddced40 r5:dddced60 r4:851dc500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dc500 r8:8027ed34 r7:eb6cde60 r6:851dc580 r5:85463000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6ddfb0 to 0xeb6ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851dd340 INFO: task kworker/0:674:5145 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb6e5d84 r8:00000002 r7:60000113 r6:eb6e5d8c r5:85466000 r5:85466000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:848c1700 r8:8027ed34 r7:eb6d5e60 r6:851dc600 r5:85466000 r4:85118180 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:675:5149 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:675 state:D stack:0 pid:5149 tgid:5149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6e9d84 r8:00000002 r7:60000013 r6:eb6e9d8c r5:85466c00 r4:85466c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85466c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ddd80 r5:00001000 r4:eb3c5000 r4:851dc680 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 7feeb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:676:5150 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:676 state:D stack:0 pid:5150 tgid:5150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6c5d84 r8:00000002 r7:60000113 r6:eb6c5d8c r5:853b5400 r4:853b5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853b5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ddc40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d1f8c r4:854d1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:677:5153 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:853b4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f1fb0 to 0xeb6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851dde00 INFO: task kworker/0:677:5153 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:853b3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:853b3c00 r8:851dc82c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:853b0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb6f9fb0 to 0xeb6f9ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:680:5158 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:680 state:D stack:0 pid:5158 tgid:5158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb701d84 r8:00000002 r7:60000113 r6:eb701d8c r5:84586c00 r4:84586c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84586c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb701e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dd6c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84586c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb59d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d2f8c r4:854d2c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d2f8c r4:851dc900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84586c00 r8:851dc92c r7:82804d40 r6:dddced40 r5:dddced60 r4:851dc900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dc900 r8:8027ed34 r7:eb6f1e60 r6:848c1a00 r5:84586c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb701fb0 to 0xeb701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ddf80 INFO: task kworker/0:680:5158 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:681:5160 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:681 state:D stack:0 pid:5160 tgid:5160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb711d84 r8:00000002 r7:60000013 r6:eb711d8c r5:84a90c00 r4:84a90c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a90c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb711e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dd800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a90c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb705000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d338c r4:854d3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d338c r4:851dc980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a90c00 r8:851dc9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851dc980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dc980 r8:8027ed34 r7:eb6f1e60 r6:848c1a80 r5:84a90c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb711fb0 to 0xeb711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851dd480 INFO: task kworker/0:681:5160 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:682:5162 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:682 state:D stack:0 pid:5162 tgid:5162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:84a90000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:851dca00 r8:8027ed34 r7:eb6f1e60 r6:848c1b00 r5:84a90000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:683:5164 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r5:84a93000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e5280 r7:dddced40 r6:83018000 r5:854e8f8c r4:851dca80 Exception stack(0xeb72dfb0 to 0xeb72dff8) Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:684:5166 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:684 state:D stack:0 pid:5166 tgid:5166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb73dd84 r8:00000002 r7:60000013 r6:eb73dd8c r5:84a92400 r4:84a92400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a92400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb73de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512d2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb733000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d3f8c r4:854d3c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d3f8c r4:851dcb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a92400 r8:851dcb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851dcb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dcb00 r8:8027ed34 r7:eb72de60 r6:848c1c00 r5:84a92400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb73dfb0 to 0xeb73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512d100 INFO: task kworker/0:684:5166 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:5169 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:5169 tgid:5169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6edd84 r8:00000002 r7:60000113 r6:eb6edd8c r5:84a93c00 r4:84a93c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a93c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ede08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512d5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb753000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d838c r4:854d8000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d838c r4:851dcb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a93c00 r8:851dcbac r7:82804d40 r6:dddced40 r5:dddced60 r4:851dcb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dcb80 r8:8027ed34 r7:eb72de60 r6:848c1c80 r5:84a93c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6edfb0 to 0xeb6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512d340 INFO: task kworker/0:685:5169 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:5171 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:336 state:D stack:0 pid:5171 tgid:5171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6c1d84 r8:00000002 r7:60000113 r6:eb6c1d8c r5:84a94800 r4:84a94800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a94800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85118a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a94800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb749000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530eb8c r4:8530e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8530eb8c r4:848c1d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a94800 r8:848c1d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c1d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1d00 r8:8027ed34 r7:eb6d5e60 r6:848c1d80 r5:84a94800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c1fb0 to 0xeb6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85118f00 INFO: task kworker/1:336:5171 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:337:5173 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:337 state:D stack:0 pid:5173 tgid:5173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb731d84 r8:00000002 r7:60000113 r6:eb731d8c r5:84a95400 r4:84a95400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a95400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a95400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00e9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e838c r4:853e8000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e838c r4:848c1e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a95400 r8:848c1e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c1e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1e00 r8:8027ed34 r7:eb6c1e60 r6:848c1e80 r5:84a95400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb731fb0 to 0xeb731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85118ac0 INFO: task kworker/1:337:5173 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:686:5175 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:686 state:D stack:0 pid:5175 tgid:5175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb75dd84 r8:00000002 r7:60000013 r6:eb75dd8c r5:84a96000 r4:84a96000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a96000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb75de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512d740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a96000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb759000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d878c r4:854d8400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d878c r4:851dcc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a96000 r8:851dcc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851dcc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dcc00 r8:8027ed34 r7:eb72de60 r6:848c1f00 r5:84a96000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb75dfb0 to 0xeb75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512d580 INFO: task kworker/0:686:5175 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:687:5177 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:687 state:D stack:0 pid:5177 tgid:5177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb76dd84 r8:00000002 r7:60000013 r6:eb76dd8c r5:84a96c00 r4:84a96c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a96c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb76de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512d7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb763000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d8b8c r4:854d8800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d8b8c r4:851dcc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a96c00 r8:851dccac r7:82804d40 r6:dddced40 r5:dddced60 r4:851dcc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dcc80 r8:8027ed34 r7:eb72de60 r6:848c1f80 r5:84a96c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb76dfb0 to 0xeb76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512d940 INFO: task kworker/0:687:5177 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:688:5180 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:688 state:D stack:0 pid:5180 tgid:5180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb775d84 r8:00000002 r7:60000113 r6:eb775d8c r5:84a91800 r4:84a91800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a91800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb775e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512d980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a91800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb769000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d8f8c r4:854d8c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d8f8c r4:851dcd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a91800 r8:851dcd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851dcd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dcd00 r8:8027ed34 r7:eb72de60 r6:851d1000 r5:84a91800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb775fb0 to 0xeb775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512d8c0 INFO: task kworker/0:688:5180 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:689:5181 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:689 state:D stack:0 pid:5181 tgid:5181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb779d84 r8:00000002 r7:60000113 r6:eb779d8c r5:853b6c00 r4:853b6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853b6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb779e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512da40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb77b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d938c r4:854d9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d938c r4:851dcd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b6c00 r8:851dcdac r7:82804d40 r6:dddced40 r5:dddced60 r4:851dcd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dcd80 r8:8027ed34 r7:eb72de60 r6:851d1080 r5:853b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb779fb0 to 0xeb779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512d8c0 INFO: task kworker/0:689:5181 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:5185 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:338 state:D stack:0 pid:5185 tgid:5185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb785d84 r8:00000002 r7:60000013 r6:eb785d8c r5:85498000 r4:85498000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85498000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb785e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85498000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89a1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e878c r4:853e8400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e878c r4:851d1100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85498000 r8:851d112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1100 r8:8027ed34 r7:eb731e60 r6:851d1180 r5:85498000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb785fb0 to 0xeb785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126140 INFO: task kworker/1:338:5185 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:690:5186 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:690 state:D stack:0 pid:5186 tgid:5186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4c5d84 r8:00000002 r7:60000113 r6:eb4c5d8c r5:85499800 r4:85499800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85499800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849fd000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85499800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb21f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d978c r4:854d9400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d978c r4:851dce00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85499800 r8:851dce2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851dce00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dce00 r8:8027ed34 r7:eb72de60 r6:851d1200 r5:85499800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c5fb0 to 0xeb4c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512dc00 INFO: task kworker/0:690:5186 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:339:5188 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:339 state:D stack:0 pid:5188 tgid:5188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb751d84 r8:00000002 r7:60000113 r6:eb751d8c r5:8549a400 r4:8549a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8549a400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e8b8c r4:853e8800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e8b8c r4:851d1300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549a400 r8:851d132c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1300 r8:8027ed34 r7:eb785e60 r6:851d1280 r5:8549a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb751fb0 to 0xeb751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851262c0 INFO: task kworker/1:339:5188 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:340:5190 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:340 state:D stack:0 pid:5190 tgid:5190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5c5d84 r8:00000002 r7:60000013 r6:eb5c5d8c r5:8549b000 r4:8549b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851266c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8549b000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e8f8c r4:853e8c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e8f8c r4:851d1400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549b000 r8:851d142c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1400 r8:8027ed34 r7:eb751e60 r6:851d1480 r5:8549b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c5fb0 to 0xeb5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126500 INFO: task kworker/1:340:5190 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:341:5192 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:5192 tgid:5192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb619d84 r8:00000002 r7:60000113 r6:eb619d8c r5:85550c00 r4:85550c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85550c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85550c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e938c r4:853e9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e938c r4:851d1380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85550c00 r8:851d13ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1380 r10:00000000 r9:851d1380 r8:8027ed34 r7:eb5c5e60 r6:851dce80 r5:85550c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb619fb0 to 0xeb619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126600 INFO: task kworker/1:341:5192 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb635d84 r8:00000002 r7:60000113 r6:eb635d8c r5:85553000 r5:85553000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:5196 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:343 state:D stack:0 pid:5196 tgid:5196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb789d84 r8:00000002 r7:60000113 r6:eb789d8c r5:85553c00 r4:85553c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85553c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512dec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85553c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb455000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ea78c r4:853ea400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ea78c r4:851d1500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85553c00 r8:851d152c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1500 r8:8027ed34 r7:eb635e60 r6:851dcf80 r5:85553c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb789fb0 to 0xeb789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126940 INFO: task kworker/1:343:5196 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a50b8c r4:85a50800 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/1:344:5197 blocked for more than 459 seconds. r5:85552400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:851d1600 r8:8027ed34 r7:eb789e60 r6:84747000 r5:85552400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:345:5199 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:345 state:D stack:0 pid:5199 tgid:5199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb795d84 r8:00000002 r7:60000113 r6:eb795d8c r5:85555400 r4:85555400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85555400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85555400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb25b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e9f8c r4:853e9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e9f8c r4:851d1680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85555400 r8:851d16ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1680 r8:8027ed34 r7:eb789e60 r6:84747080 r5:85555400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb795fb0 to 0xeb795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126a00 INFO: task kworker/1:345:5199 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:691:5202 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:691 state:D stack:0 pid:5202 tgid:5202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb79dd84 r8:00000002 r7:60000113 r6:eb79dd8c r5:85556000 r4:85556000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85556000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb79de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849fd440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85556000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d9b8c r4:854d9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d9b8c r4:84747100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85556000 r8:8474712c r7:82804d40 r6:dddced40 r5:dddced60 r4:84747100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84747100 r8:8027ed34 r7:eb72de60 r6:84747180 r5:85556000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849fd200 INFO: task kworker/0:691:5202 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85551800 r5:85551800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ea38c r4:853ea000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ea38c r4:851d1700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85551800 r8:851d172c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1700 r8:8027ed34 r7:eb789e60 r6:84747200 r5:85551800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a1fb0 to 0xeb7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126b80 INFO: task kworker/1:346:5203 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84879d00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb799d84 r8:00000002 r7:60000113 r6:eb799d8c r5:85556c00 r5:85556c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb799e08 r4:00000000 r5:854d9f8c r4:854d9c00 r4:84747280 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bd0 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85554800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854da38c r4:854da000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854da38c r4:84747380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85554800 r8:847473ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84747380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84747380 r8:8027ed34 r7:eb72de60 r6:84747400 r5:85554800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5cdfb0 to 0xeb5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849fd540 INFO: task kworker/0:693:5208 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:5210 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:347 state:D stack:0 pid:5210 tgid:5210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7a5d84 r8:00000002 r7:60000013 r6:eb7a5d8c r5:85550000 r4:85550000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85550000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126ec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85550000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb469000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853eab8c r4:853ea800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853eab8c r4:851d1780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85550000 r8:851d17ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1780 r8:8027ed34 r7:eb789e60 r6:84747480 r5:85550000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a5fb0 to 0xeb7a5ff8) r4:8512dd00 INFO: task kworker/1:347:5210 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:348:5212 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:348 state:D stack:0 pid:5212 tgid:5212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85462400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ade08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85462400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb487000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853eaf8c r4:853eac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853eaf8c r4:851d1800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85462400 r8:851d182c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:349:5214 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred r5:84a38c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:853eb38c r4:853eb000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853eb38c r4:851d1880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a38c00 r8:851d18ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1880 r8:8027ed34 r7:eb7ade60 r6:84747580 r5:84a38c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b5fb0 to 0xeb7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847dc080 INFO: task kworker/1:349:5214 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:350:5217 blocked for more than 459 seconds. task:kworker/1:350 state:D stack:0 pid:5217 tgid:5217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7c1d84 r8:00000002 r7:60000113 r6:eb7c1d8c r5:84a38000 r4:84a38000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a38000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc3c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a38000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ebb8c r4:853eb800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ebb8c r4:851d1900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a38000 r8:851d192c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1900 r8:8027ed34 r7:eb7b5e60 r6:84747600 r5:84a38000 Exception stack(0xeb7c1fb0 to 0xeb7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847dc1c0 INFO: task kworker/1:350:5217 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaec9fb0 to 0xeaec9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84a3b000 r5:84a3b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:851d1980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1980 r8:8027ed34 r7:eb7c1e60 r6:84747680 r5:84a3b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c5fb0 to 0xeb7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847dc1c0 INFO: task kworker/1:351:5218 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:5221 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:5221 tgid:5221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7d1d84 r8:00000002 r7:60000113 r6:eb7d1d8c r5:84a3a400 r4:84a3a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a3a400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e7000 r5:853ebf8c r4:853ebc00 r4:851d1a00 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847dc400 INFO: task kworker/1:352:5221 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:353:5222 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:353 state:D stack:0 pid:5222 tgid:5222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a39800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb4f7000 r7:ddde2d40 r6:83018200 r5:853f038c r4:851d1a80 Exception stack(0xeb7d5fb0 to 0xeb7d5ff8) INFO: task kworker/1:353:5222 is blocked on a mutex likely owned by task kworker/0:416:4498. 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r5:00001000 r4:ecc4f000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:354:5225 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:354 state:D stack:0 pid:5225 tgid:5225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7e1d84 r8:00000002 r7:60000013 r6:eb7e1d8c r5:84a3e000 r5:84a3e000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dcac0 r5:853f0f8c r4:853f0c00 r4:851d1b00 Exception stack(0xeb7e1fb0 to 0xeb7e1ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a50b8c r4:85a50800 r4:84879d00 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:5226 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:5226 tgid:5226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7e5d84 r8:00000002 r7:60000013 r6:eb7e5d8c r5:84a3ec00 r4:84a3ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb517000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f078c r4:853f0400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f078c r4:851d1b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:851d1bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1b80 r8:8027ed34 r7:eb7e1e60 r6:84747880 r5:84a3ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e5fb0 to 0xeb7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847dc680 INFO: task kworker/1:355:5226 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:00000000 r5:00001000 r4:ecc4f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:5227 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:5227 tgid:5227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5e1d84 r8:00000002 r7:60000013 r6:eb5e1d8c r5:8549d400 r4:8549d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8549d400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb533000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f0b8c r4:853f0800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f0b8c r4:851d1c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549d400 r8:851d1c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1c00 r8:8027ed34 r7:eb7e1e60 r6:851d1c80 r5:8549d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847dc7c0 INFO: task kworker/1:356:5227 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb7ddd84 r8:00000002 r7:60000013 r6:eb7ddd8c r5:8549bc00 r5:8549bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:00001000 r4:eb61b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f178c r4:853f1400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f178c r4:851d1d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549bc00 r8:851d1d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1d00 r8:8027ed34 r7:eb7e1e60 r6:851d1d80 r5:8549bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7ddfb0 to 0xeb7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847dca40 INFO: task kworker/1:357:5230 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:5231 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:5231 tgid:5231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7a9d84 r8:00000002 r7:60000113 r6:eb7a9d8c r5:8549e000 r4:8549e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dcb80 r4:00000000 r5:00001000 r4:eb5bd000 r7:ddde2d40 r6:83018200 r5:853f138c r4:851d1e00 9fa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:359:5234 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:359 state:D stack:0 pid:5234 tgid:5234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7f1d84 r8:00000002 r7:60000013 r6:eb7f1d8c r5:8549ec00 r4:8549ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512dd80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8549ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb645000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f1f8c r4:853f1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f1f8c r4:851d1f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549ec00 r8:851d1f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d1f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1f00 r8:8027ed34 r7:eb7dde60 r6:851d1f80 r5:8549ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f1fb0 to 0xeb7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847dcdc0 INFO: task kworker/1:359:5234 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:5237 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:5237 tgid:5237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7f9d84 r8:00000002 r7:60000113 r6:eb7f9d8c r5:8549c800 r4:8549c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849fd7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:eb629000 r5:853f1b8c r4:853f1800 r4:851ae000 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:361:5238 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:361 state:D stack:0 pid:5238 tgid:5238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7edd84 r8:00000002 r7:60000113 r6:eb7edd8c r5:85498c00 r4:85498c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85498c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85498c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb651000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f238c r4:853f2000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f238c r4:851ae100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85498c00 r8:851ae12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851ae100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ae100 r8:8027ed34 r7:eb7f1e60 r6:851ae180 r5:85498c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7edfb0 to 0xeb7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b1040 INFO: task kworker/1:361:5238 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:362 state:D stack:0 pid:5240 tgid:5240 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854a0000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7fde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853f2b8c r4:853f2800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f2b8c r4:851ae200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a0000 r8:851ae22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851ae200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ae200 r8:8027ed34 r7:eb7ede60 r6:851ae280 r5:854a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7fdfb0 to 0xeb7fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b1040 INFO: task kworker/1:362:5240 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:854a0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:853f278c r4:853f2400 r10:00000000 r9:851ae300 r8:8027ed34 r7:eb7fde60 r6:851ae380 r5:854a0c00 INFO: task kworker/1:363:5242 is blocked on a mutex likely owned by task kworker/0:416:4498. Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/1:364:5244 blocked for more than 459 seconds. r5:854a2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f2f8c r4:853f2c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f2f8c r4:851ae400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a2400 r8:851ae42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851ae400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ae400 r8:8027ed34 r7:eb7fde60 r6:851ae480 r5:854a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb809fb0 to 0xeb809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b1380 INFO: task kworker/1:364:5244 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:365:5246 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:365 state:D stack:0 pid:5246 tgid:5246 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854a3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1b40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb823000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f3b8c r4:853f3800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f3b8c r4:851ae500 r10:61c88647 r9:854a3c00 r8:851ae52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb80dfb0 to 0xeb80dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:00001000 r4:ecc4f000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:854a1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb80f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854a1800 r8:851ae62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851ae600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ae600 r8:8027ed34 r7:eb80de60 r6:851ae680 r5:854a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb805fb0 to 0xeb805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b1840 INFO: task kworker/1:366:5249 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:367 state:D stack:0 pid:5250 tgid:5250 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854a4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:853f378c r4:853f3400 r10:00000000 r9:851ae700 r8:8027ed34 r7:eb80de60 r6:851ae780 r5:854a4800 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:854a5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a45300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb681000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ea78c r4:854ea400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ea78c r4:851ae800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a5400 r8:851ae82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851ae800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ae800 r8:8027ed34 r7:eb80de60 r6:851ae880 r5:854a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb821fb0 to 0xeb821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b1b00 INFO: task kworker/1:368:5252 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 80413000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/1:369:5253 blocked for more than 459 seconds. r5:854a6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1c00 r7:ddde2d40 r6:83018200 r5:853f3f8c r4:851ae900 Exception stack(0xeb835fb0 to 0xeb835ff8) INFO: task kworker/1:369:5253 is blocked on a mutex likely owned by task kworker/0:416:4498. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:370:5255 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:370 state:D stack:0 pid:5255 tgid:5255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:854a3000 r5:854a3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb839e08 r5:00001000 r4:eb83b000 r4:851aea00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:854a8c00 r5:854a8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8546c78c r4:8546c400 r4:851aeb00 5fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 823d3000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:694:5262 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:694 state:D stack:0 pid:5262 tgid:5262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb725d84 r8:00000002 r7:60000013 r6:eb725d8c r5:854a9800 r4:854a9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb725e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535b7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dab8c r4:854da800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854dab8c r4:84747900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a9800 r8:8474792c r7:82804d40 r6:dddced40 r5:dddced60 r4:84747900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84747900 r8:8027ed34 r7:eb72de60 r6:851aec00 r5:854a9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb725fb0 to 0xeb725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535b800 INFO: task kworker/0:694:5262 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 82623000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:695:5263 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:695 state:D stack:0 pid:5263 tgid:5263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb859d84 r8:00000002 r7:60000013 r6:eb859d8c r5:854aa400 r4:854aa400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854aa400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:8535bac0 Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb861d84 r8:00000002 r7:60000113 r6:eb861d8c r5:854abc00 r5:854abc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ba40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854db38c r4:854db000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854db38c r4:84747a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854abc00 r8:84747a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84747a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84747a00 r8:8027ed34 r7:eb72de60 r6:851aed00 r5:854abc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb861fb0 to 0xeb861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535b900 INFO: task kworker/0:696:5265 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 829ad000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:697:5267 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:697 state:D stack:0 pid:5267 tgid:5267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb869d84 r8:00000002 r7:60000113 r6:eb869d8c r5:854a8000 r4:854a8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:372 state:D stack:0 pid:5269 tgid:5269 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb871e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:698:5270 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:698 state:D stack:0 pid:5270 tgid:5270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb875d84 r8:00000002 r7:60000013 r6:eb875d8c r5:854ae000 r4:854ae000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ae000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb875e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535bd00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dbb8c r4:854db800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854dbb8c r4:84747b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ae000 r8:84747b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84747b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84747b00 r8:8027ed34 r7:eb72de60 r6:851aef00 r5:854ae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb875fb0 to 0xeb875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535ba80 INFO: task kworker/0:698:5270 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:82ac11e4 r4:00000000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:699 state:D stack:0 pid:5272 tgid:5272 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a3d400 r4:829187f0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3d400 r8:84747bac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 83458000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:700:5274 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:700 state:D stack:0 pid:5274 tgid:5274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb87dd84 r8:00000002 r7:60000013 r6:eb87dd8c r5:84a3bc00 r4:84a3bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb87de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535b500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a3bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:849b2f8c r4:84747c80 Exception stack(0xeb87dfb0 to 0xeb87dff8) Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:701:5277 blocked for more than 460 seconds. task:kworker/0:701 state:D stack:0 pid:5277 tgid:5277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb881d84 r8:00000002 r7:60000113 r6:eb881d8c r5:84a3c800 r4:84a3c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb881e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84987b40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb193000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e838c r4:854e8000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854e838c r4:84747d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3c800 r8:84747dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84747d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84747d80 r8:8027ed34 r7:eb72de60 r6:84747e00 r5:84a3c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb881fb0 to 0xeb881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84987900 INFO: task kworker/0:701:5277 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 83c6a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:702:5279 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:702 state:D stack:0 pid:5279 tgid:5279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb885d84 r8:00000002 r7:60000113 r6:eb885d8c r5:85465400 r4:85465400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85465400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e5040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85465400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 r5:00001000 r4:eb1b3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854e878c r4:84747e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85465400 r8:84747eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84747e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84747e80 r8:8027ed34 r7:eb72de60 r6:84747f00 r5:85465400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb885fb0 to 0xeb885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e5080 INFO: task kworker/0:702:5279 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 83c6a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:703 state:D stack:0 pid:5281 tgid:5281 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85558000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb889e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85558000 r8:84747fac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 r5:85a50b8c r4:85a50800 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:704 state:D stack:0 pid:5283 tgid:5283 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85558c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e54c0 r5:854e938c r4:854e9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854e938c r4:84912080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85558c00 r8:849120ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84912080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84912080 r8:8027ed34 r7:eb72de60 r6:84912100 r5:85558c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb88dfb0 to 0xeb88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e52c0 INFO: task kworker/0:704:5283 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 83e27000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:705 state:D stack:0 pid:5285 tgid:5285 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85559800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:8555a400 r4:8555a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8555a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e5800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8555a400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e9b8c r4:854e9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854e9b8c r4:84912280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8555a400 r8:849122ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84912280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84912280 r8:8027ed34 r7:eb891e60 r6:84912300 r5:8555a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e55c0 INFO: task kworker/0:706:5287 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8435c000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:707 state:D stack:0 pid:5288 tgid:5288 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8555b000 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:854ea38c r4:84912380 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e55c0 INFO: task kworker/0:707:5288 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8435c000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8555c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8555c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb89de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e58c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8555c800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e9f8c r4:854e9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854e9f8c r4:84912480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8555c800 r8:849124ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84912480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84912480 r8:8027ed34 r7:eb84de60 r6:84912500 r5:8555c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb89dfb0 to 0xeb89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e55c0 INFO: task kworker/0:708:5290 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 84940000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r4:eaec9dc0 r4:00000000 r5:85a50b8c r4:85a50800 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:709 state:D stack:0 pid:5291 tgid:5291 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854ac800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a1e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854eb78c r4:854eb400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854eb78c r4:84912580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ac800 r8:849125ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84912580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84912580 r8:8027ed34 r7:eb84de60 r6:851aef80 r5:854ac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a1fb0 to 0xeb8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e55c0 INFO: task kworker/0:709:5291 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 84b7a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:373:5294 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:373 state:D stack:0 pid:5294 tgid:5294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb899d84 r8:00000002 r7:60000113 r6:eb899d8c r5:854aec00 r4:854aec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854aec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb899e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a45280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854eab8c r4:854ea800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854eab8c r4:85362000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854aec00 r8:8536202c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85362000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85362000 r8:8027ed34 r7:eb821e60 r6:85362080 r5:854aec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb899fb0 to 0xeb899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 r5:85a50b8c r4:85a50800 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:710 state:D stack:0 pid:5296 tgid:5296 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854ad400 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:854ad400 r8:8491262c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:5298 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:374 state:D stack:0 pid:5298 tgid:5298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8a5d84 r8:00000002 r7:60000113 r6:eb8a5d8c r5:854a6000 r4:854a6000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6fd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546cf8c r4:8546cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546cf8c r4:85362180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a6000 r8:853621ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85362180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85362180 r8:8027ed34 r7:eb899e60 r6:85362200 r5:854a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a5fb0 to 0xeb8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84820000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b1e08 r9:83018205 r8:84820000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r7:ddde2d40 r6:83018200 r5:8546db8c r4:85362280 Exception stack(0xeb8b1fb0 to 0xeb8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a45c80 INFO: task kworker/1:375:5301 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 85c48000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84820c00 r5:84820c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85362380 dfa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/0:711:5305 blocked for more than 460 seconds. r4:84821800 r5:84821800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b9e08 r9:83018005 r8:84821800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854eb38c r4:84912680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84821800 r8:849126ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84912680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84912680 r8:8027ed34 r7:eb8a1e60 r6:85362480 r5:84821800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b9fb0 to 0xeb8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511c080 INFO: task kworker/0:711:5305 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 86606000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:851e4ec0 task:kworker/0:712 state:D stack:0 pid:5307 tgid:5307 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84822400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511c480 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb8bdfb0 to 0xeb8bdff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:713 state:D stack:0 pid:5308 tgid:5308 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84823000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:854ebf8c r4:84912780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84823000 r8:849127ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84912780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84912780 r8:8027ed34 r7:eb8bde60 r6:85362580 r5:84823000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511c3c0 INFO: task kworker/0:713:5308 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8717d000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:714:5311 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:714 state:D stack:0 pid:5311 tgid:5311 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84823c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:82ac11e4 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84824800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85512cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84824800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546d78c r4:8546d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546d78c r4:85362680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84824800 r8:853626ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85362680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85362680 r8:8027ed34 r7:eb8b1e60 r6:85362700 r5:84824800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c9fb0 to 0xeb8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2c140 INFO: task kworker/1:377:5312 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 87c09000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:851e4ec0 Not tainted 6.15.0-syzkaller #0 r5:84825400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:716 state:D stack:0 pid:5317 tgid:5317 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84826000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8dde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511c9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84826000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb77f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ecb8c r4:854ec800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854ecb8c r4:84912900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84826000 r8:8491292c r7:82804d40 r6:dddced40 r5:dddced60 r4:84912900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84912900 r8:8027ed34 r7:eb8b5e60 r6:85362800 r5:84826000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8ddfb0 to 0xeb8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511c500 INFO: task kworker/0:716:5317 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 881c8000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:717:5319 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:717 state:D stack:0 pid:5319 tgid:5319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8e9d84 r8:00000002 r7:60000013 r6:eb8e9d8c r5:854b0c00 r4:854b0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511cd80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8850f000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:854b1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb8d9000 r10:61c88647 r9:854b1800 r8:84912a2c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511c940 INFO: task kworker/0:718:5320 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8850f000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:719 state:D stack:0 pid:5322 tgid:5322 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854b3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511cc00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:854ed38c r4:84912a80 dfa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 r5:00001000 r4:ecc4f000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854b2400 r5:854b2400 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:854b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 r10:61c88647 r9:854b2400 r8:84912b2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:721:5327 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:721 state:D stack:0 pid:5327 tgid:5327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb919d84 r8:00000002 r7:60000113 r6:eb919d8c r5:854b3c00 r4:854b3c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb919e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85370000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb911000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854edf8c r4:854edc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854edf8c r4:84912b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b3c00 r8:84912bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84912b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84912b80 r8:8027ed34 r7:eb909e60 r6:85362a80 r5:854b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb919fb0 to 0xeb919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:722 state:D stack:0 pid:5329 tgid:5329 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854b5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:854b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 r10:61c88647 r9:854b5400 r8:84912c2c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85370180 INFO: task kworker/0:722:5329 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 89086000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:723:5330 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:723 state:D stack:0 pid:5330 tgid:5330 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb931d84 r8:00000002 r7:60000113 r6:eb931d8c r5:854b6000 r5:854b6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb931e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84912c80 Exception stack(0xeb931fb0 to 0xeb931ff8) Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:724:5333 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:724 state:D stack:0 pid:5333 tgid:5333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb941d84 r8:00000002 r7:60000113 r6:eb941d8c r5:854b4800 r4:854b4800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb941e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853702c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb92d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ee78c r4:854ee400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854ee78c r4:84912d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b4800 r8:84912d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84912d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84912d00 r8:8027ed34 r7:eb929e60 r6:85362c00 r5:854b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb941fb0 to 0xeb941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853701c0 INFO: task kworker/0:724:5333 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 893b1000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:725:5334 blocked for more than 461 seconds. r4:84826c00 r5:84826c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08 r9:83018005 r8:84826c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 r10:61c88647 r9:84826c00 r8:84912dac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:726:5337 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:726 state:D stack:0 pid:5337 tgid:5337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb95dd84 r8:00000002 r7:60000013 r6:eb95dd8c r5:854b8c00 r4:854b8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb95de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85370680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ef38c r4:854ef000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854ef38c r4:84912e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b8c00 r8:84912e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84912e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84912e00 r8:8027ed34 r7:eb929e60 r6:85362d00 r5:854b8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb95dfb0 to 0xeb95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85370400 INFO: task kworker/0:726:5337 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 89b19000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:727:5339 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:727 state:D stack:0 pid:5339 tgid:5339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb96dd84 r8:00000002 r7:60000013 r6:eb96dd8c r5:854ba400 r4:854ba400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ba400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb96de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85370d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:854f078c r4:854f0400 r4:84912e80 dfa0: 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:728:5340 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:728 state:D stack:0 pid:5340 tgid:5340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7b9d84 r8:00000002 r7:60000113 r6:eb7b9d8c r5:854b8000 r4:854b8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853707c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa63000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ef78c r4:854ef400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854ef78c r4:84912f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b8000 r8:84912f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84912f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84912f00 r8:8027ed34 r7:eb96de60 r6:85362e00 r5:854b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b9fb0 to 0xeb7b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853706c0 INFO: task kworker/0:728:5340 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 89ed8000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaec9fb0 to 0xeaec9ff8) r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:854bbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb971e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:854efb8c r4:84912f80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r5:80070013 r4:80239bd0 r4:eaec9dc0 r4:00000000 r5:85a50b8c r4:85a50800 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:730:5344 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:730 state:D stack:0 pid:5344 tgid:5344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8c5d84 r8:00000002 r7:60000113 r6:eb8c5d8c r5:8555bc00 r4:8555bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8555bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85370a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8555bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead5f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854eff8c r4:854efc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854eff8c r4:85508000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8555bc00 r8:8550802c r7:82804d40 r6:dddced40 r5:dddced60 r4:85508000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85508000 r8:8027ed34 r7:eb96de60 r6:85508080 r5:8555bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c5fb0 to 0xeb8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85370900 INFO: task kworker/0:730:5344 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) r5:80070013 r4:80239bd0 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:731:5347 blocked for more than 461 seconds. r5:8555ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:854f038c r4:854f0000 r4:85508100 Exception stack(0xeb979fb0 to 0xeb979ff8) INFO: task kworker/0:731:5347 is blocked on a mutex likely owned by task kworker/0:416:4498. 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:732:5349 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:732 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb97dd84 r8:00000002 r7:60000113 r6:eb97dd8c r5:8555e000 r4:8555e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8555e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb97de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2c500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8555e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb25d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f0f8c r4:854f0c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854f0f8c r4:85508200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8555e000 r8:8550822c r7:82804d40 r6:dddced40 r5:dddced60 r4:85508200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85508200 r8:8027ed34 r7:eb96de60 r6:85508280 r5:8555e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb97dfb0 to 0xeb97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85370d40 INFO: task kworker/0:732:5349 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8a57e000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:8555d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bd0 r4:eaec9dc0 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:734:5354 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:734 state:D stack:0 pid:5354 tgid:5354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb985d84 r8:00000002 r7:60000013 r6:eb985d8c r5:84b20000 r4:84b20000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b20000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb985e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c0c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b20000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb467000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f1b8c r4:854f1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854f1b8c r4:85508400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b20000 r8:8550842c r7:82804d40 r6:dddced40 r5:dddced60 r4:85508400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85508400 r8:8027ed34 r7:eb97de60 r6:85508480 r5:84b20000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb985fb0 to 0xeb985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511cf00 INFO: task kworker/0:734:5354 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8aebe000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84b20c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8b029000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:736:5357 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:736 state:D stack:0 pid:5357 tgid:5357 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb98dd84 r8:00000002 r7:60000113 r6:eb98dd8c r5:84b21800 r4:84b21800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b21800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb98de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bd0 r4:eaec9dc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b22400 r5:84b22400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b22400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb489000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f1f8c r4:854f1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854f1f8c r4:85508700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b22400 r8:8550872c r7:82804d40 r6:dddced40 r5:dddced60 r4:85508700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85508700 r8:8027ed34 r7:eb985e60 r6:85508780 r5:84b22400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb991fb0 to 0xeb991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8551c100 INFO: task kworker/0:737:5359 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8b3dc000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r5:00001000 r4:ecc4f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 r4:851e4ec0 Not tainted 6.15.0-syzkaller #0 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84b23000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb995e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb4a7000 r5:854f238c r4:854f2000 r10:61c88647 r9:84b23000 r8:8550882c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:739:5364 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:739 state:D stack:0 pid:5364 tgid:5364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb99dd84 r8:00000002 r7:60000113 r6:eb99dd8c r5:84b23c00 r4:84b23c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b23c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb99de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551ca40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b23c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb519000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f2f8c r4:854f2c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854f2f8c r4:85508900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b23c00 r8:8550892c r7:82804d40 r6:dddced40 r5:dddced60 r4:85508900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85508900 r8:8027ed34 r7:eb995e60 r6:85508980 r5:84b23c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb99dfb0 to 0xeb99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8551c440 INFO: task kworker/0:739:5364 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 r5:85a50b8c r4:85a50800 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:84b24800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d1e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85508a00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:85a50b8c r4:85a50800 r4:84879d00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:741:5367 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:741 state:D stack:0 pid:5367 tgid:5367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9a5d84 r8:00000002 r7:60000113 r6:eb9a5d8c r5:84b26000 r4:84b26000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b26000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b26000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f2b8c r4:854f2800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854f2b8c r4:85508b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b26000 r8:85508b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85508b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85508b00 r8:8027ed34 r7:eb99de60 r6:85508b80 r5:84b26000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a5fb0 to 0xeb9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8551c8c0 INFO: task kworker/0:741:5367 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8be30000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:742:5370 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:742 state:D stack:0 pid:5370 tgid:5370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9a1d84 r8:00000002 r7:60000013 r6:eb9a1d8c r5:84b26c00 r4:84b26c00 r5:84b26c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551cb40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f338c r4:854f3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854f338c r4:85508c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b26c00 r8:85508c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85508c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85508c00 r8:8027ed34 r7:eb99de60 r6:85508c80 r5:84b26c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a1fb0 to 0xeb9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8551ca00 INFO: task kworker/0:742:5370 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8be30000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:84b25400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:744:5373 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:744 state:D stack:0 pid:5373 tgid:5373 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9add84 r8:00000002 r7:60000113 r6:eb9add8c r5:855a8000 r4:855a8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855a8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ade08 r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:855a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:854f378c r4:854f3400 r10:61c88647 r9:855a8000 r8:85508e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:00000000 r5:00001000 r4:ecc4f000 r5:85a50b8c r4:85a50800 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:855a8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552f100 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb637000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f3f8c r4:854f3c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854f3f8c r4:85508f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a8c00 r8:85508f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85508f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85508f00 r8:8027ed34 r7:eb9a9e60 r6:85508f80 r5:855a8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b1fb0 to 0xeb9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552f080 INFO: task kworker/0:745:5375 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8c520000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:746:5377 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:746 state:D stack:0 pid:5377 tgid:5377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9b5d84 r8:00000002 r7:60000013 r6:eb9b5d8c r5:855a9800 r4:855a9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855a9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552f3c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550038c r4:85500000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8550038c r4:85530080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a9800 r8:855300ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85530080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530080 r8:8027ed34 r7:eb9b1e60 r6:85530100 r5:855a9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b5fb0 to 0xeb9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552f300 INFO: task kworker/0:746:5377 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8cbe9000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:747:5378 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:747 state:D stack:0 pid:5378 tgid:5378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9bdd84 r8:00000002 r7:60000113 r6:eb9bdd8c r5:855aa400 r4:855aa400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855aa400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9bde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552fac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7bb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550178c r4:85501400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8550178c r4:85530000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855aa400 r8:8553002c r7:82804d40 r6:dddced40 r5:dddced60 r4:85530000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530000 r8:8027ed34 r7:eb9b5e60 r6:85530180 r5:855aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9bdfb0 to 0xeb9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552f1c0 INFO: task kworker/0:747:5378 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8cbe9000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:748:5381 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:748 state:D stack:0 pid:5381 tgid:5381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9b9d84 r8:00000002 r7:60000013 r6:eb9b9d8c r5:855ab000 r4:855ab000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855ab000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552f440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb65d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550078c r4:85500400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8550078c r4:85530200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ab000 r8:8553022c r7:82804d40 r6:dddced40 r5:dddced60 r4:85530200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530200 r8:8027ed34 r7:eb9bde60 r6:85530280 r5:855ab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b9fb0 to 0xeb9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552f580 INFO: task kworker/0:748:5381 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8d378000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:749:5383 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:749 state:D stack:0 pid:5383 tgid:5383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9c5d84 r8:00000002 r7:60000013 r6:eb9c5d8c r5:855abc00 r4:855abc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855abc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552f600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb66d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85500b8c r4:85500800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85500b8c r4:85530300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855abc00 r8:8553032c r7:82804d40 r6:dddced40 r5:dddced60 r4:85530300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530300 r8:8027ed34 r7:eb9bde60 r6:85530380 r5:855abc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c5fb0 to 0xeb9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552f5c0 INFO: task kworker/0:749:5383 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8d378000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/0:750:5384 blocked for more than 461 seconds. r5:855ac800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85500f8c r4:85500c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85500f8c r4:85530400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ac800 r8:8553042c r7:82804d40 r6:dddced40 r5:dddced60 r4:85530400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530400 r8:8027ed34 r7:eb9bde60 r6:85530480 r5:855ac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c9fb0 to 0xeb9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552f5c0 INFO: task kworker/0:750:5384 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8db5d000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:855ae000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85530500 r8:8027ed34 r7:eb9bde60 r6:85530580 r5:855ae000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8db5d000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:752:5388 blocked for more than 461 seconds. r5:855aec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb965000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85502b8c r4:85502800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85502b8c r4:85530600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855aec00 r8:8553062c r7:82804d40 r6:dddced40 r5:dddced60 r4:85530600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530600 r8:8027ed34 r7:eb9bde60 r6:85530680 r5:855aec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d1fb0 to 0xeb9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552fc00 INFO: task kworker/0:752:5388 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8e127000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb9d5d84 r8:00000002 r7:60000013 r6:eb9d5d8c r5:855b1800 r5:855b1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552fd00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:eaec9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:754:5393 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:754 state:D stack:0 pid:5393 tgid:5393 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9ddd84 r8:00000002 r7:60000013 r6:eb9ddd8c r5:855b2400 r4:855b2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9dde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb827000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85501f8c r4:85501c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85501f8c r4:85530800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b2400 r8:8553082c r7:82804d40 r6:dddced40 r5:dddced60 r4:85530800 r10:00000000 r9:85530800 r8:8027ed34 r7:eb9d1e60 r6:85530880 r5:855b2400 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb9cdd84 r8:00000002 r7:60000013 r6:eb9cdd8c r5:854bb000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 r4:eaec9dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:379:5397 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:379 state:D stack:0 pid:5397 tgid:5397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9d9d84 r8:00000002 r7:60000113 r6:eb9d9d8c r5:854bd400 r4:854bd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854bd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85512440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb83d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550238c r4:85502000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8550238c r4:85538000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: 8e4b9000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:85a50b8c r4:85a50800 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854be000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:8550278c r4:85530900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854be000 r8:8553092c r7:82804d40 r6:dddced40 r5:dddced60 r4:85530900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530900 r8:8027ed34 r7:eb9d1e60 r6:85538100 r5:854be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e9fb0 to 0xeb9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85531100 INFO: task kworker/0:755:5399 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8e4b9000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:380:5401 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:380 state:D stack:0 pid:5401 tgid:5401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9e5d84 r8:00000002 r7:60000113 r6:eb9e5d8c r5:854bec00 r4:854bec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854bec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e5e08 r9:83018205 r8:854bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 r10:61c88647 r9:854bec00 r8:855381ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaec9d20 to 0xeaec9d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:851e4ec0 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:756 state:D stack:0 pid:5404 tgid:5404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9fdd84 r8:00000002 r7:60000013 r6:eb9fdd8c r5:854b6c00 r4:854b6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9fde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855317c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba05000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550338c r4:85503000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8550338c r4:85530980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b6c00 r8:855309ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85530980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530980 r8:8027ed34 r7:eb9d1e60 r6:85538280 r5:854b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9fdfb0 to 0xeb9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855314c0 INFO: task kworker/0:756:5404 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8edd1000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:854b0000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba09e08 r9:83018005 r8:854b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 r10:61c88647 r9:854b0000 r8:85530a2c r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8edd1000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:758:5407 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:758 state:D stack:0 pid:5407 tgid:5407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba15d84 r8:00000002 r7:60000113 r6:eba15d8c r5:854b9800 r4:854b9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba21000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85503b8c r4:85503800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85503b8c r4:85530a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b9800 r8:85530aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85530a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530a80 r8:8027ed34 r7:eb9fde60 r6:85538380 r5:854b9800 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:855b8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531880 r7:dddced40 r6:83018000 r5:8550378c r4:85530b00 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 9d20: 8f281000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:760:5411 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:760 state:D stack:0 pid:5411 tgid:5411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba2dd84 r8:00000002 r7:60000113 r6:eba2dd8c r5:855b8000 r4:855b8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba2de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531e00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa8f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562078c r4:85620400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562078c r4:85530b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b8000 r8:85530bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85530b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530b80 r8:8027ed34 r7:eba15e60 r6:85538480 r5:855b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba2dfb0 to 0xeba2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85531940 INFO: task kworker/0:760:5411 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d60: 80070013 ffffffff r4:82ac11e4 r4:eaec9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:761:5413 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:761 state:D stack:0 pid:5413 tgid:5413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba39d84 r8:00000002 r7:60000113 r6:eba39d8c r5:855b9800 r4:855b9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba39e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba3b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85503f8c r4:85503c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85503f8c r4:85530c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b9800 r8:85530c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85530c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530c00 r8:8027ed34 r7:eba2de60 r6:85538500 r5:855b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba39fb0 to 0xeba39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85531a40 INFO: task kworker/0:761:5413 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8fabb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:762:5415 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:762 state:D stack:0 pid:5415 tgid:5415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba49d84 r8:00000002 r7:60000013 r6:eba49d8c r5:855ba400 r4:855ba400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855ba400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba41000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562038c r4:85620000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562038c r4:85530c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ba400 r8:85530cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85530c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530c80 r8:8027ed34 r7:eba2de60 r6:85538580 r5:855ba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba49fb0 to 0xeba49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85531a40 INFO: task kworker/0:762:5415 is blocked on a mutex likely owned by task kworker/0:416:4498. r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:85a50b8c r4:85a50800 r4:84879d00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:763:5417 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:763 state:D stack:0 pid:5417 tgid:5417 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8e1d84 r8:00000002 r7:60000013 r6:eb8e1d8c r5:855bb000 r4:855bb000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855bb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552ff40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85620f8c r4:85620c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85620f8c r4:85530d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bb000 r8:85530d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85530d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530d00 r8:8027ed34 r7:eba2de60 r6:85538600 r5:855bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e1fb0 to 0xeb8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85531c40 INFO: task kworker/0:763:5417 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 8fd89000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:764:5419 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:764 state:D stack:0 pid:5419 tgid:5419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb901d84 r8:00000002 r7:60000113 r6:eb901d8c r5:855bbc00 r4:855bbc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855bbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb901e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531ec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0885000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85620b8c r4:85620800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85620b8c r4:85530d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bbc00 r8:85530dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85530d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530d80 r8:8027ed34 r7:eb8e1e60 r6:85538680 r5:855bbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb901fb0 to 0xeb901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85531d80 INFO: task kworker/0:764:5419 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80070013 ffffffff r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:855bc800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855eb1c0 r5:8562178c r4:85621400 r10:00000000 r9:85530e00 r8:8027ed34 r7:eb8e1e60 r6:85538700 r5:855bc800 r4:85531f00 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 9d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r5:85a50b8c r4:85a50800 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:766:5423 blocked for more than 462 seconds. task:kworker/0:766 state:D stack:0 pid:5423 tgid:5423 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855b3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ede08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855eb040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562138c r4:85621000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562138c r4:85530e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3000 r8:85530eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85530e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530e80 r8:8027ed34 r7:eb939e60 r6:85530f00 r5:855b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9edfb0 to 0xeb9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855eb000 INFO: task kworker/0:766:5423 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 902db000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:855b3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855b5400 r5:855b5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855eb5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85621f8c r4:85621c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85621f8c r4:855ef080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b5400 r8:855ef0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ef080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ef080 r8:8027ed34 r7:eba55e60 r6:855ef100 r5:855b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855eb380 INFO: task kworker/0:768:5428 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 906d7000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r4:eaec9dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/0:769:5430 blocked for more than 462 seconds. r5:855b6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba5de08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:855b6000 r8:855ef1ac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:770:5432 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:770 state:D stack:0 pid:5432 tgid:5432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba61d84 r8:00000002 r7:60000113 r6:eba61d8c r5:855b6c00 r4:855b6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba61e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ebc00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85622b8c r4:85622800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85622b8c r4:855ef280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b6c00 r8:855ef2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ef280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ef280 r8:8027ed34 r7:eba5de60 r6:855ef300 r5:855b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba61fb0 to 0xeba61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855eb580 INFO: task kworker/0:770:5432 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 90b5a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:771:5435 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:771 state:D stack:0 pid:5435 tgid:5435 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba69d84 r8:00000002 r7:60000113 r6:eba69d8c r5:855b0000 r4:855b0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba69e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855eba40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb357000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba69fb0 to 0xeba69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855eba00 INFO: task kworker/0:771:5435 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 90b5a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:855ad400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba6de08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:855ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:773:5439 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:773 state:D stack:0 pid:5439 tgid:5439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba71d84 r8:00000002 r7:60000113 r6:eba71d8c r5:84530000 r4:84530000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84530000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba71e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f0000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84530000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6cf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562378c r4:85623400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562378c r4:855ef580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84530000 r8:855ef5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ef580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ef580 r8:8027ed34 r7:eba6de60 r6:855ef600 r5:84530000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba71fb0 to 0xeba71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ebbc0 INFO: task kworker/0:773:5439 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 9d60: 80070013 ffffffff r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851e4ec0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84530c00 r5:84530c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855eb880 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8562338c r4:855ef680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84530c00 r8:855ef6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ef680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ef680 r8:8027ed34 r7:eba71e60 r6:855ef700 r5:84530c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba65fb0 to 0xeba65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85531080 INFO: task kworker/0:774:5440 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 911b2000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r5:84531800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:776:5446 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:776 state:D stack:0 pid:5446 tgid:5446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba79d84 r8:00000002 r7:60000113 r6:eba79d8c r5:84532400 r4:84532400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84532400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba79e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f0780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84532400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb745000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85628b8c r4:85628800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85628b8c r4:855ef880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84532400 r8:855ef8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ef880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:eaec9dc0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84533000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba7de08 r9:83018005 r8:84533000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 r10:61c88647 r9:84533000 r8:855ef9ac r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:777:5448 is blocked on a mutex likely owned by task kworker/0:416:4498. r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 916ba000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:778:5449 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:778 state:D stack:0 pid:5449 tgid:5449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba81d84 r8:00000002 r7:60000013 r6:eba81d8c r5:84533c00 r4:84533c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84533c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84533c00 r8:855efaac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:778:5449 is blocked on a mutex likely owned by task kworker/0:416:4498. 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:85a50b8c r4:85a50800 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba85d84 r8:00000002 r7:60000013 r6:eba85d8c r5:84534800 r4:84534800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84534800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba85e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f0600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84534800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb735000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562878c r4:85628400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562878c r4:855efb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84534800 r8:855efbac r7:82804d40 r6:dddced40 r5:dddced60 r4:855efb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855efb80 r8:8027ed34 r7:eba79e60 r6:855efc00 r5:84534800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba85fb0 to 0xeba85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f08c0 INFO: task kworker/0:779:5451 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:84535400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb767000 r7:dddced40 r6:83018000 r5:8562938c r4:855efc80 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f0a40 INFO: task kworker/0:780:5454 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 91b43000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:781:5455 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:781 state:D stack:0 pid:5455 tgid:5455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba75d84 r8:00000002 r7:60000113 r6:eba75d8c r5:84536000 r4:84536000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84536000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f0900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84536000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb757000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaec9d20 to 0xeaec9d68) 9d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:84536c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84536c00 r8:855efeac r7:82804d40 r6:dddced40 r5:dddced60 r4:855efe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855efe80 r8:8027ed34 r7:eba89e60 r6:855eff00 r5:84536c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba8dfb0 to 0xeba8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f09c0 INFO: task kworker/0:782:5458 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 91c78000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:783:5459 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:783 state:D stack:0 pid:5459 tgid:5459 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba91d84 r8:00000002 r7:60000113 r6:eba91d8c r5:855b0c00 r4:855b0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba91e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856011c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562a38c r4:8562a000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562a38c r4:855eff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b0c00 r8:855effac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:784:5460 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred r4:855c0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f0d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb863000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85629b8c r4:85629800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85629b8c r4:85603080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0000 r8:856030ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603080 r8:8027ed34 r7:eba91e60 r6:85603100 r5:855c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba99fb0 to 0xeba99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f0cc0 INFO: task kworker/0:784:5460 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 923c0000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eba9dd84 r8:00000002 r7:60000013 r6:eba9dd8c r5:855c0c00 r5:855c0c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85601000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb86d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85629f8c r4:85629c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85629f8c r4:85603180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0c00 r8:856031ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603180 r8:8027ed34 r7:eba91e60 r6:85603200 r5:855c0c00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:85a50b8c r4:85a50800 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/0:786:5465 blocked for more than 462 seconds. r10:829187f4 r9:ebaa1d84 r8:00000002 r7:60000013 r6:ebaa1d8c r5:855c1800 r5:855c1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 926f4000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:787:5466 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:787 state:D stack:0 pid:5466 tgid:5466 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebaa5d84 r8:00000002 r7:60000113 r6:ebaa5d8c r5:855c3c00 r4:855c3c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85601400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8e3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562a78c r4:8562a400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562a78c r4:85603380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c3c00 r8:856033ac r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) Not tainted 6.15.0-syzkaller #0 r5:855c4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562b38c r4:8562b000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562b38c r4:85603480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c4800 r8:856034ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603480 r8:8027ed34 r7:ebaa1e60 r6:85603500 r5:855c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa9fb0 to 0xebaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856015c0 INFO: task kworker/0:788:5469 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 92afe000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:789:5471 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:789 state:D stack:0 pid:5471 tgid:5471 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:855c5400 r5:855c5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaade08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8562af8c r4:8562ac00 r10:61c88647 r9:855c5400 r8:856035ac r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856017c0 INFO: task kworker/0:789:5471 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 92c3b000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:855c2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85601bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb925000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562b78c r4:8562b400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562b78c r4:85603680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c2400 r8:856036ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603680 r8:8027ed34 r7:ebaa9e60 r6:85603700 r5:855c2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab1fb0 to 0xebab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:791 state:D stack:0 pid:5475 tgid:5475 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855c6000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:855c6000 r8:856037ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:792:5476 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:792 state:D stack:0 pid:5476 tgid:5476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebab5d84 r8:00000002 r7:60000013 r6:ebab5d8c r5:855c6c00 r4:855c6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85601dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb953000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562bf8c r4:8562bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562bf8c r4:85603880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c6c00 r8:856038ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603880 r8:8027ed34 r7:eba95e60 r6:85603900 r5:855c6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab5fb0 to 0xebab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:793:5479 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:793 state:D stack:0 pid:5479 tgid:5479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebab9d84 r8:00000002 r7:60000013 r6:ebab9d8c r5:855c3000 r4:855c3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85609000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8563878c r4:85638400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: 93696000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85603a80 r8:8027ed34 r7:ebab9e60 r6:85603b00 r5:855b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac1fb0 to 0xebac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85601e00 INFO: task kworker/0:794:5480 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 93a89000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:795:5483 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:795 state:D stack:0 pid:5483 tgid:5483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebac9d84 r8:00000002 r7:60000113 r6:ebac9d8c r5:84b28000 r4:84b28000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b28000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85609140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b28000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85638b8c r4:85638800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85638b8c r4:85603b80 r10:61c88647 r9:84b28000 r8:85603bac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:85603b80 r8:8027ed34 r7:ebab9e60 r6:85603c00 r5:84b28000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac9fb0 to 0xebac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85609280 INFO: task kworker/0:795:5483 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 93ee7000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:796 state:D stack:0 pid:5485 tgid:5485 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad5e08 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:ebadf000 r7:dddced40 r6:83018000 r5:85638f8c r4:85603c80 r10:61c88647 r9:84b28c00 r8:85603cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603c80 r8:8027ed34 r7:ebac9e60 r6:85603d00 r5:84b28c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad5fb0 to 0xebad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85609100 INFO: task kworker/0:796:5485 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 93ee7000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:797:5486 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:797 state:D stack:0 pid:5486 tgid:5486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:84b29800 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebaf3000 r10:61c88647 r9:84b29800 r8:85603dac r7:82804d40 r6:dddced40 r5:dddced60 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebadde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8563938c r4:85603e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b2a400 r8:85603eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603e80 r8:8027ed34 r7:ebabde60 r6:85603f00 r5:84b2a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaddfb0 to 0xebaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856093c0 INFO: task kworker/0:798:5488 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 94374000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae9e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebb0d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 94374000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 task:kworker/0:800 state:D stack:0 pid:5492 tgid:5492 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:00001000 r4:ebaf9000 r10:61c88647 r9:84b2bc00 r8:856140ac r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:801:5495 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:801 state:D stack:0 pid:5495 tgid:5495 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebafdd84 r8:00000002 r7:60000113 r6:ebafdd8c r5:84b2c800 r4:84b2c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b2c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebafde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85609940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b2c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb07000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85639f8c r4:85639c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85639f8c r4:85614180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b2c800 r8:856141ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:802:5496 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:802 state:D stack:0 pid:5496 tgid:5496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb05d84 r8:00000002 r7:60000113 r6:ebb05d8c r5:84b2e000 r4:84b2e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b2e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85609dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b2e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb1b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8563a78c r4:8563a400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8563a78c r4:85614280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b2e000 r8:856142ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85614280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85614280 r8:8027ed34 r7:ebae9e60 r6:85614300 r5:84b2e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb05fb0 to 0xebb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85609ac0 INFO: task kworker/0:802:5496 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ebb19d84 r8:00000002 r7:60000113 r6:ebb19d8c r5:84b2ec00 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561a140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8563af8c r4:8563ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8563af8c r4:85614380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b2ec00 r8:856143ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85614380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85614380 r8:8027ed34 r7:ebb05e60 r6:85614400 r5:84b2ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb19fb0 to 0xebb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85609ac0 INFO: task kworker/0:803:5498 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 95211000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebb2f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8563ab8c r4:8563a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8563ab8c r4:85614480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c8000 r8:856144ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85614480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85614480 r8:8027ed34 r7:ebb19e60 r6:85614500 r5:855c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb11fb0 to 0xebb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85609d80 INFO: task kworker/0:804:5499 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaec9d20 to 0xeaec9d68) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a50b8c r4:85a50800 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) r4:851e4ec0 r4:855bd400 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:00000000 r9:85538780 r8:8027ed34 r7:eb9cde60 r6:85538800 r5:855bd400 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855bec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba19e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8563b38c r4:8563b000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8563b38c r4:85614580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bec00 r8:856145ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85614580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85614580 r8:8027ed34 r7:ebb19e60 r6:85538880 r5:855bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba19fb0 to 0xeba19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8561a100 INFO: task kworker/0:805:5505 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9578e000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561a5c0 r7:dddced40 r6:83018000 r5:8563bb8c r4:85614600 Exception stack(0xebb39fb0 to 0xebb39ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:807:5508 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:807 state:D stack:0 pid:5508 tgid:5508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb2dd84 r8:00000002 r7:60000013 r6:ebb2dd8c r5:855c8c00 r4:855c8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb2de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561a440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8563b78c r4:8563b400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8563b78c r4:85614680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c8c00 r8:856146ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85614680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85614680 r8:8027ed34 r7:ebb39e60 r6:85614700 r5:855c8c00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 95b71000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:808 state:D stack:0 pid:5511 tgid:5511 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f5e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8564438c r4:85644000 r10:00000000 r9:85614780 r8:8027ed34 r7:ebb39e60 r6:85614800 r5:855cbc00 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:809:5512 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:809 state:D stack:0 pid:5512 tgid:5512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba31d84 r8:00000002 r7:60000013 r6:eba31d8c r5:855ca400 r4:855ca400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855ca400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba31e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561a740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb273000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8563bf8c r4:8563bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8563bf8c r4:85614880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ca400 r8:856148ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85614880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85614880 r8:8027ed34 r7:eb9f5e60 r6:85614900 r5:855ca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba31fb0 to 0xeba31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8561a880 INFO: task kworker/0:809:5512 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb3dd84 r8:00000002 r7:60000113 r6:ebb3dd8c r5:854c0c00 r4:854c0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb3de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561ab40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564478c r4:85644400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564478c r4:85614980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c0c00 r8:856149ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85614980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85614980 r8:8027ed34 r7:eb9f5e60 r6:85538980 r5:854c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb3dfb0 to 0xebb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8561a940 INFO: task kworker/0:810:5516 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 96782000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ecc4f000 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:811 state:D stack:0 pid:5518 tgid:5518 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb45e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85644f8c r4:85644c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85644f8c r4:85614a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c1800 r8:85614a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85614a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85614a00 r8:8027ed34 r7:ebb3de60 r6:85538a00 r5:854c1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb45fb0 to 0xebb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8561a980 INFO: task kworker/0:811:5518 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r4:00000000 r5:85a50b8c r4:85a50800 r4:84879d00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb41e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:855cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:85a50b8c r4:85a50800 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:813:5522 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:813 state:D stack:0 pid:5522 tgid:5522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb49d84 r8:00000002 r7:60000113 r6:ebb49d8c r5:855cd400 r4:855cd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855cd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb49e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564578c r4:85645400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564578c r4:85614b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855cd400 r8:85614bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85614b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85614b80 r8:8027ed34 r7:ebb45e60 r6:85614c00 r5:855cd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb49fb0 to 0xebb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85609fc0 INFO: task kworker/0:813:5522 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 96782000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84879d00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8564538c r4:85645000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:815:5526 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:815 state:D stack:0 pid:5526 tgid:5526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb51d84 r8:00000002 r7:60000013 r6:ebb51d8c r5:855cec00 r4:855cec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855cec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856191c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb639000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85645b8c r4:85645800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85645b8c r4:85614d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855cec00 r8:85614dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85614d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85614d80 r8:8027ed34 r7:ebb49e60 r6:85614e00 r5:855cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb51fb0 to 0xebb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84879d00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:855cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r10:61c88647 r9:855cc800 r8:85614eac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 97035000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:817:5530 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:817 state:D stack:0 pid:5530 tgid:5530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb59d84 r8:00000002 r7:60000013 r6:ebb59d8c r5:855c9800 r4:855c9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb677000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564638c r4:85646000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564638c r4:85614f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c9800 r8:85614fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85614f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85614f80 r8:8027ed34 r7:ebb55e60 r6:85119000 r5:855c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb59fb0 to 0xebb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 975b8000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:85a50b8c r4:85a50800 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) r4:851e4ec0 task:kworker/0:818 state:D stack:0 pid:5532 tgid:5532 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85646b8c r4:85646800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bc800 r8:851190ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85119080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85119080 r8:8027ed34 r7:ebb59e60 r6:85119100 r5:854bc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb5dfb0 to 0xebb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856193c0 INFO: task kworker/0:818:5532 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 975b8000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb65e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a48000 r8:851191ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:85a50b8c r4:85a50800 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:820:5536 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:820 state:D stack:0 pid:5536 tgid:5536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb69d84 r8:00000002 r7:60000013 r6:ebb69d8c r5:84a48c00 r4:84a48c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a48c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb69e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619b40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a48c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85646f8c r4:85646c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85646f8c r4:85119280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a48c00 r8:851192ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85119280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85119280 r8:8027ed34 r7:ebb5de60 r6:85119300 r5:84a48c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb69fb0 to 0xebb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856196c0 INFO: task kworker/0:820:5536 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) r4:851e4ec0 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb6de08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb813000 r10:61c88647 r9:84a4b000 r8:85538aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85119400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:822:5543 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:822 state:D stack:0 pid:5543 tgid:5543 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb7dd84 r8:00000002 r7:60000113 r6:ebb7dd8c r5:84a4c800 r4:84a4c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a4c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb7de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f0ec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a4c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb847000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564738c r4:85647000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564738c r4:85119500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4c800 r8:8511952c r7:82804d40 r6:dddced40 r5:dddced60 r4:85119500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85119500 r8:8027ed34 r7:ebb75e60 r6:85119580 r5:84a4c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb7dfb0 to 0xebb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85619e00 INFO: task kworker/0:822:5543 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 98121000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:383 state:D stack:0 pid:5544 tgid:5544 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:8564d38c r4:85538b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c3000 r8:85538b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85538b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85538b00 r8:8027ed34 r7:eb9cde60 r6:85538b80 r5:854c3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb61fb0 to 0xebb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851160c0 INFO: task kworker/1:383:5544 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 98121000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:823 state:D stack:0 pid:5546 tgid:5546 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb71e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb957000 r7:dddced40 r6:83018000 r5:85647b8c r4:85119600 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:85a50b8c r4:85a50800 r4:84879d00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8564778c r4:85119680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c4800 r8:851196ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85119680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85119680 r8:8027ed34 r7:ebb71e60 r6:85538c80 r5:854c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb81fb0 to 0xebb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85521140 INFO: task kworker/0:824:5547 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 986b3000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/0:825:5550 blocked for more than 463 seconds. Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb8dd84 r8:00000002 r7:60000013 r6:ebb8dd8c r5:854c5400 r4:854c5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85521240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb969000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85647f8c r4:85647c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85647f8c r4:85119700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c5400 r8:8511972c r7:82804d40 r6:dddced40 r5:dddced60 r4:85119700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85119700 r8:8027ed34 r7:ebb71e60 r6:85538d00 r5:854c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb8dfb0 to 0xebb8dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:826:5553 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:826 state:D stack:0 pid:5553 tgid:5553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb99d84 r8:00000002 r7:60000013 r6:ebb99d8c r5:854c6000 r4:854c6000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb99e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85521380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb997000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85521280 INFO: task kworker/0:826:5553 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 98d16000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebb9dfb0 to 0xebb9dff8) r4:85521280 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a50b8c r4:85a50800 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:828 state:D stack:0 pid:5556 tgid:5556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebba5d84 r8:00000002 r7:60000013 r6:ebba5d8c r5:854c8c00 r4:854c8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85521a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564df8c r4:8564dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564df8c r4:85119880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c8c00 r8:851198ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85119880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85119880 r8:8027ed34 r7:ebb9de60 r6:85538e80 r5:854c8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba5fb0 to 0xebba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85521580 INFO: task kworker/0:828:5556 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 991e0000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:829:5558 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:829 state:D stack:0 pid:5558 tgid:5558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebba9d84 r8:00000002 r7:60000113 r6:ebba9d8c r5:854c9800 r4:854c9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85521640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba01000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564cb8c r4:8564c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564cb8c r4:85119900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c9800 r8:8511992c r7:82804d40 r6:dddced40 r5:dddced60 r4:85119900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:85a50b8c r4:85a50800 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/0:830:5559 blocked for more than 463 seconds. r4:854ca400 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85521840 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:831:5561 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:831 state:D stack:0 pid:5561 tgid:5561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebba1d84 r8:00000002 r7:60000113 r6:ebba1d8c r5:854cb000 r4:854cb000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85521bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba35000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564d78c r4:8564d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564d78c r4:85119a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cb000 r8:85119a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85119a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85119a00 r8:8027ed34 r7:ebba5e60 r6:8535e000 r5:854cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba1fb0 to 0xebba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85521a00 INFO: task kworker/0:831:5561 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9956e000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r4:82ac11e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:851e4ec0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85521c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564db8c r4:8564d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564db8c r4:85119a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cbc00 r8:85119aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85119a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85119a80 r8:8027ed34 r7:ebba5e60 r6:8535e080 r5:854cbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb1fb0 to 0xebbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85521a00 INFO: task kworker/0:832:5564 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 99ae7000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8564e78c r4:8564e400 r4:85119b00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:5568 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:5568 tgid:5568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbc1d84 r8:00000002 r7:60000113 r6:ebbc1d8c r5:854cd400 r4:854cd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471e940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8535e180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:834:5569 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:834 state:D stack:0 pid:5569 tgid:5569 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbc5d84 r8:00000002 r7:60000113 r6:ebbc5d8c r5:854ce000 r4:854ce000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ce000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85521f40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564e38c r4:8564e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564e38c r4:85119b80 r4:85119b80 Exception stack(0xebbc5fb0 to 0xebbc5ff8) Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a182c0 r7:dddced40 r6:83018000 r5:8564ef8c r4:85119c00 Exception stack(0xebbe1fb0 to 0xebbe1ff8) r4:84a18280 Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:836:5574 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:836 state:D stack:0 pid:5574 tgid:5574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbe9d84 r8:00000002 r7:60000113 r6:ebbe9d8c r5:854cec00 r4:854cec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a18140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564eb8c r4:8564e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564eb8c r4:85119c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cec00 r8:85119cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85119c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85119c80 r8:8027ed34 r7:ebbe1e60 r6:8535e380 r5:854cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe9fb0 to 0xebbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a18280 INFO: task kworker/0:836:5574 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9a363000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:837:5576 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a18380 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebbf9fb0 to 0xebbf9ff8) r4:84a18400 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r4:00000000 r5:85a50b8c r4:85a50800 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a18c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85660c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc45000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85650b8c r4:85650800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85650b8c r4:85119d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85660c00 r8:85119dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85119d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85119d80 r8:8027ed34 r7:ebbf9e60 r6:8535e480 r5:85660c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc01fb0 to 0xebc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a18540 INFO: task kworker/0:838:5577 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9ad8c000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:839:5579 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:839 state:D stack:0 pid:5579 tgid:5579 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8564f78c r4:8564f400 r10:61c88647 r9:85662400 r8:85119e2c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d60: 80070013 ffffffff r4:eaec9dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:851e4ec0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:ebc19d84 r8:00000002 r7:60000113 r6:ebc19d8c r5:85661800 r4:85661800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85661800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc19e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a18700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85661800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc0d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564fb8c r4:8564f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564fb8c r4:85119e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85661800 r8:85119eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85119e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85119e80 r8:8027ed34 r7:ebc01e60 r6:8535e580 r5:85661800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc19fb0 to 0xebc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a184c0 INFO: task kworker/0:840:5581 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9afa2000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaec9fb0 to 0xeaec9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:841 state:D stack:0 pid:5583 tgid:5583 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc25d84 r8:00000002 r7:60000113 r6:ebc25d8c r5:85663000 r4:85663000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85663000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc25e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a187c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85663000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc27000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564ff8c r4:8564fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564ff8c r4:85119f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85663000 r8:85119f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85119f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85119f00 r8:8027ed34 r7:ebc01e60 r6:8535e600 r5:85663000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc25fb0 to 0xebc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a18640 INFO: task kworker/0:841:5583 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:85663c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 r10:61c88647 r9:85663c00 r8:85119fac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9b743000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:843:5587 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:843 state:D stack:0 pid:5587 tgid:5587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:ebb79d84 r8:00000002 r7:60000113 r6:ebb79d8c r5:84a49800 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a18a00 r7:dddced40 r6:83018000 r5:8565078c r4:848c2000 Exception stack(0xebb79fb0 to 0xebb79ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r4:00000000 r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:844:5591 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:844 state:D stack:0 pid:5591 tgid:5591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc39d84 r8:00000002 r7:60000013 r6:ebc39d8c r5:84a4e000 r4:84a4e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a4e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc39e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a18d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a4e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc53000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85650f8c r4:85650c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85650f8c r4:848c2100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4e000 r8:848c212c r7:82804d40 r6:dddced40 r5:dddced60 r4:848c2100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c2100 r8:8027ed34 r7:ebc01e60 r6:848c2180 r5:84a4e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc39fb0 to 0xebc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a18b40 INFO: task kworker/0:844:5591 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9be09000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:eaec9dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaec9fb0 to 0xeaec9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 r10:61c88647 r9:84a4ec00 r8:848c222c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a18b40 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:846:5594 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:846 state:D stack:0 pid:5594 tgid:5594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc51d84 r8:00000002 r7:60000113 r6:ebc51d8c r5:84a4d400 r4:84a4d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a4d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc51e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85651f8c r4:85651c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a4a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc65e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85521e40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a4a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc67000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565178c r4:85651400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8565178c r4:848c2400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4a400 r8:848c242c r7:82804d40 r6:dddced40 r5:dddced60 r4:848c2400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c2400 r8:8027ed34 r7:ebc51e60 r6:848c2480 r5:84a4a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc65fb0 to 0xebc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85521fc0 INFO: task kworker/0:847:5596 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9c9fc000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:eaec9dc0 r5:00001000 r4:ecc4f000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:848:5599 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:848 state:D stack:0 pid:5599 tgid:5599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebc71fb0 to 0xebc71ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r4:00000000 r5:85a50b8c r4:85a50800 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:850:5601 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:850 state:D stack:0 pid:5601 tgid:5601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc5dd84 r8:00000002 r7:60000013 r6:ebc5dd8c r5:848f8c00 r4:848f8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc5de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855231c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa95000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565278c r4:85652400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8565278c r4:848c2700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f8c00 r8:848c272c r7:82804d40 r6:dddced40 r5:dddced60 r4:848c2700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c2700 r8:8027ed34 r7:ebc79e60 r6:848c2780 r5:848f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc5dfb0 to 0xebc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85523180 INFO: task kworker/0:850:5601 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9d2b2000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:85a50b8c r4:85a50800 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:848f9800 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:848c2800 r8:8027ed34 r7:ebc5de60 r6:848c2880 r5:848f9800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 r5:85a50b8c r4:85a50800 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/0:852:5606 blocked for more than 464 seconds. [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85523940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85653b8c r4:85653800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85653b8c r4:848c2900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fa400 r8:848c292c r7:82804d40 r6:dddced40 r5:dddced60 r4:848c2900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c2900 r8:8027ed34 r7:ebc85e60 r6:848c2980 r5:848fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc8dfb0 to 0xebc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855235c0 INFO: task kworker/0:852:5606 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9d71c000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:853:5608 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:853 state:D stack:0 pid:5608 tgid:5608 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:848fb000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc95e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r4:00000000 r5:85a50b8c r4:85a50800 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:854:5610 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:854 state:D stack:0 pid:5610 tgid:5610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc99d84 r8:00000002 r7:60000113 r6:ebc99d8c r5:848fbc00 r4:848fbc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc99e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855236c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565338c r4:85653000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8565338c r4:848c2b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fbc00 r8:848c2b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848c2b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c2b00 r8:8027ed34 r7:ebc8de60 r6:848c2b80 r5:848fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc99fb0 to 0xebc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85523680 INFO: task kworker/0:854:5610 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:80070013 r4:80239bd0 r4:eaec9dc0 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8565378c r4:848c2c00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85523c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a838c r4:856a8000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a838c r4:848c2d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fd400 r8:848c2d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848c2d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c2d00 r8:8027ed34 r7:ebc8de60 r6:848c2d80 r5:848fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca1fb0 to 0xebca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855237c0 INFO: task kworker/0:856:5614 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9de6a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:857:5615 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:857 state:D stack:0 pid:5615 tgid:5615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc91d84 r8:00000002 r7:60000113 r6:ebc91d8c r5:848fe000 r4:848fe000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fe000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc91e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85523b40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb339000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85653f8c r4:85653c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85653f8c r4:848c2e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fe000 r8:848c2e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:00001000 r4:ecc4f000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:858 state:D stack:0 pid:5618 tgid:5618 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:848fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r7:dddced40 r6:83018000 r5:856a878c r4:848c2f00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85523c40 INFO: task kworker/0:858:5618 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9e1e7000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:859:5621 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:859 state:D stack:0 pid:5621 tgid:5621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcadd84 r8:00000002 r7:60000113 r6:ebcadd8c r5:85668000 r4:85668000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85668000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcade08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2b040 r7:dddced40 r6:83018000 r5:856a8b8c r4:84a5c000 Exception stack(0xebcadfb0 to 0xebcadff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:860 state:D stack:0 pid:5622 tgid:5622 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:856a8f8c r4:856a8c00 r4:84a5c100 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9e545000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:861:5625 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:861 state:D stack:0 pid:5625 tgid:5625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcb1d84 r8:00000002 r7:60000013 r6:ebcb1d8c r5:85669800 r4:85669800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85669800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r4:00000000 r5:85a50b8c r4:85a50800 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/0:862:5627 blocked for more than 464 seconds. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2b480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8566a400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb74d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a978c r4:856a9400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a978c r4:84a5c300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8566a400 r8:84a5c32c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a5c300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a5c300 r8:8027ed34 r7:ebcb1e60 r6:84a5c380 r5:8566a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcb9fb0 to 0xebcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2b640 INFO: task kworker/0:862:5627 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9ea25000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcbde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2b680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8566b000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb771000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a9b8c r4:856a9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a9b8c r4:84a5c400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8566b000 r8:84a5c42c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a5c400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a5c400 r8:8027ed34 r7:ebcb9e60 r6:84a5c480 r5:8566b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcbdfb0 to 0xebcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2b4c0 INFO: task kworker/0:863:5630 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9ecb0000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:00000000 r5:00001000 r4:ecc4f000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/0:864:5631 blocked for more than 464 seconds. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r5:80070013 r4:80239bd0 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:865 state:D stack:0 pid:5633 tgid:5633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2bbc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85666c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856aab8c r4:856aa800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856aab8c r4:84a5c580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85666c00 r8:84a5c5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a5c580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a5c580 r8:8027ed34 r7:ebcc9e60 r6:8535e780 r5:85666c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd1fb0 to 0xebcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2ba40 INFO: task kworker/0:865:5633 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9f36a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:866 state:D stack:0 pid:5634 tgid:5634 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9f36a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:867:5637 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:867 state:D stack:0 pid:5637 tgid:5637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:ebcd5d84 r8:00000002 r7:60000113 r6:ebcd5d8c r5:8566c800 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebcd5fb0 to 0xebcd5ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:868:5640 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8566d400 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:856ab38c r4:84a5c800 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:856aaf8c r4:856aac00 r10:00000000 r9:84a5c900 r8:8027ed34 r7:ebcd9e60 r6:84a5c980 r5:8566e000 r4:84a2bc00 INFO: task kworker/0:869:5641 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: 9fa6a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:870:5643 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:870 state:D stack:0 pid:5643 tgid:5643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebce1d84 r8:00000002 r7:60000013 r6:ebce1d8c r5:8566ec00 r4:8566ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8566ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85523d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8566ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b88000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2bfc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b88000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb949000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856abb8c r4:856ab800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856abb8c r4:84a5cb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b88000 r8:84a5cb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a5cb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a5cb00 r8:8027ed34 r7:ebce1e60 r6:84a5cb80 r5:84b88000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebce5fb0 to 0xebce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2bf80 INFO: task kworker/0:871:5645 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d60: 80070013 ffffffff r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:856b078c r4:856b0400 r10:00000000 r9:84a5cc00 r8:8027ed34 r7:ebce5e60 r6:84a5cc80 r5:84b88c00 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/0:873:5649 blocked for more than 464 seconds. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcede08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550e000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b89800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb961000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856abf8c r4:856abc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856abf8c r4:84a5cd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b89800 r8:84a5cd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a5cd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a5cd00 r8:8027ed34 r7:ebce9e60 r6:84a5cd80 r5:84b89800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcedfb0 to 0xebcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550e300 INFO: task kworker/0:873:5649 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a017d000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550e1c0 r10:61c88647 r9:84b8a400 r8:84a5ce2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ebcf1d84 r8:00000002 r7:60000113 r6:ebcf1d8c r5:84b8b000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8b000 r8:84a5cf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a5cf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a5cf00 r8:8027ed34 r7:ebce9e60 r6:84a5cf80 r5:84b8b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf1fb0 to 0xebcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550e3c0 INFO: task kworker/0:875:5653 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a07cc000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebcf9fb0 to 0xebcf9ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:ebcf5d84 r8:00000002 r7:60000113 r6:ebcf5d8c r5:84b8c800 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8548b100 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf5fb0 to 0xebcf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550e500 INFO: task kworker/0:877:5656 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a07cc000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:878:5660 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:878 state:D stack:0 pid:5660 tgid:5660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcfdd84 r8:00000002 r7:60000013 r6:ebcfdd8c r5:84b8d400 r4:84b8d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b8d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcfde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8548b200 r8:8027ed34 r7:ebcf5e60 r6:8548b280 r5:84b8d400 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851e4ec0 task:kworker/0:879 state:D stack:0 pid:5661 tgid:5661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8548b300 r8:8027ed34 r7:ebcfde60 r6:8548b380 r5:84b8e000 r4:8550e6c0 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a103c000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:880:5664 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:880 state:D stack:0 pid:5664 tgid:5664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebd09d84 r8:00000002 r7:60000113 r6:ebd09d8c r5:84b8ec00 r4:84b8ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b8ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd09e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550ec80 r7:dddced40 r6:83018000 r5:856b1f8c r4:8548b400 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:85a50b8c r4:85a50800 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/0:881:5665 blocked for more than 464 seconds. r4:85680000 r5:85680000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550ee40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85680000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb31000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b238c r4:856b2000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b238c r4:8548b500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85680000 r8:8548b52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8548b500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548b500 r8:8027ed34 r7:ebd09e60 r6:8548b580 r5:85680000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd0dfb0 to 0xebd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550ea40 INFO: task kworker/0:881:5665 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a1600000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85680c00 r5:85680c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd11e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8548b600 r8:8027ed34 r7:ebd0de60 r6:8548b680 r5:85680c00 INFO: task kworker/0:882:5667 is blocked on a mutex likely owned by task kworker/0:416:4498. r5:80070013 r4:80239bd0 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:883 state:D stack:0 pid:5669 tgid:5669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebd19d84 r8:00000002 r7:60000013 r6:ebd19d8c r5:85681800 r4:85681800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85681800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd19e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a3040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85681800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd15000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b278c r4:856b2400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b278c r4:8548b700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85681800 r8:8548b72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8548b700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548b700 r8:8027ed34 r7:ebd11e60 r6:8548b780 r5:85681800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd19fb0 to 0xebd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a3080 INFO: task kworker/0:883:5669 is blocked on a mutex likely owned by task kworker/0:416:4498. Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:884:5671 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:884 state:D stack:0 pid:5671 tgid:5671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebd21d84 r8:00000002 r7:60000013 r6:ebd21d8c r5:85682400 r4:85682400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85682400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd21e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a3300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85682400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd29000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b2f8c r4:856b2c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b2f8c r4:8548b800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85682400 r8:8548b82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8548b800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548b800 r8:8027ed34 r7:ebd11e60 r6:8548b880 r5:85682400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd21fb0 to 0xebd21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:856a3200 Call trace: 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:ecc4f000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:885:5673 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:885 state:D stack:0 pid:5673 tgid:5673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85683000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebd2dfb0 to 0xebd2dff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/0:886:5674 blocked for more than 464 seconds. r5:85683c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:856b378c r4:8548ba00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a1eb5000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:887:5677 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:887 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebd35d84 r8:00000002 r7:60000013 r6:ebd35d8c r5:85684800 r4:85684800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85684800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd35e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:856b3b8c r4:8548bb00 Exception stack(0xebd35fb0 to 0xebd35ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85685400 r5:85685400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd49e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8548bc00 r8:8027ed34 r7:ebd35e60 r6:8548bc80 r5:85685400 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:889:5681 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:889 state:D stack:0 pid:5681 tgid:5681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebd55d84 r8:00000002 r7:60000013 r6:ebd55d8c r5:85686000 r4:85686000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85686000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd55e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a3a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85686000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd63000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85686c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a3cc0 r7:dddced40 r6:83018000 r5:856c078c r4:8548be00 Exception stack(0xebd61fb0 to 0xebd61ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r5:85a50b8c r4:85a50800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:891:5684 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:891 state:D stack:0 pid:5684 tgid:5684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebd41d84 r8:00000002 r7:60000113 r6:ebd41d8c r5:84a68000 r4:84a68000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a68000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd41e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a3e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a68000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd77000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c0b8c r4:856c0800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856c0b8c r4:8548bf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a68000 r8:8548bf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8548bf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548bf00 r8:8027ed34 r7:ebd61e60 r6:8548bf80 r5:84a68000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd41fb0 to 0xebd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a3e00 INFO: task kworker/0:891:5684 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a282d000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ebd6dd84 r8:00000002 r7:60000113 r6:ebd6dd8c r5:84a68c00 r5:84a68c00 r4:829187f0 r4:00000000 r4:00000000 r5:00001000 r4:ebd7d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c0f8c r4:856c0c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856c0f8c r4:85367000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a68c00 r8:8536702c r7:82804d40 r6:dddced40 r5:dddced60 r4:85367000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85367000 r8:8027ed34 r7:ebd41e60 r6:85367080 r5:84a68c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd6dfb0 to 0xebd6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550ef40 INFO: task kworker/0:892:5687 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a2a83000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 r4:00000000 r5:85a50b8c r4:85a50800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:893:5689 blocked for more than 464 seconds. r5:84a69800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:856c138c r4:856c1000 r10:00000000 r9:85367100 r8:8027ed34 r7:ebd6de60 r6:85367180 r5:84a69800 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a6a400 r5:84a6a400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd89e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853600c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a6a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd91000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c178c r4:856c1400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856c178c r4:85367200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6a400 r8:8536722c r7:82804d40 r6:dddced40 r5:dddced60 r4:85367200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85367200 r8:8027ed34 r7:ebd81e60 r6:85367280 r5:84a6a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd89fb0 to 0xebd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853601c0 INFO: task kworker/0:894:5691 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a2bef000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a6b000 r5:84a6b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:856c1b8c r4:856c1800 r10:00000000 r9:85367300 r8:8027ed34 r7:ebd89e60 r6:85367380 r5:84a6b000 INFO: task kworker/0:895:5694 is blocked on a mutex likely owned by task kworker/0:416:4498. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:896:5695 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:896 state:D stack:0 pid:5695 tgid:5695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebd9dd84 r8:00000002 r7:60000113 r6:ebd9dd8c r5:84a6bc00 r4:84a6bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd9de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85360480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a6bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebda5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c1f8c r4:856c1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856c1f8c r4:85367400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6bc00 r8:8536742c r7:82804d40 r6:dddced40 r5:dddced60 r4:85367400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xebd9dfb0 to 0xebd9dff8) INFO: task kworker/0:896:5695 is blocked on a mutex likely owned by task kworker/0:416:4498. 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:85a50b8c r4:85a50800 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a6c800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a6c800 r8:8536752c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:898:5705 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:898 state:D stack:0 pid:5705 tgid:5705 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebd75d84 r8:00000002 r7:60000113 r6:ebd75d8c r5:84a6d400 r4:84a6d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd75e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85360680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a6d400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c278c r4:856c2400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856c278c r4:85367600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6d400 r8:8536762c r7:82804d40 r6:dddced40 r5:dddced60 r4:85367600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85367600 r8:8027ed34 r7:ebda9e60 r6:85367680 r5:84a6d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd75fb0 to 0xebd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85360b40 INFO: task kworker/0:898:5705 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a37a4000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84a6e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc31e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:856c2b8c r4:856c2800 r4:85367700 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80070013 ffffffff r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84a6ec00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85367800 5fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:901:5708 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:901 state:D stack:0 pid:5708 tgid:5708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:85688000 r5:85688000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc49e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853608c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85688000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:902 state:D stack:0 pid:5709 tgid:5709 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:ebdb1d84 r8:00000002 r7:60000113 r6:ebdb1d8c r5:85688c00 r4:85688c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85688c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdb1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85360ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85688c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856c378c r4:856c3400 r4:85367a00 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85689800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:856c3b8c r4:856c3800 r10:00000000 r9:85367b00 r8:8027ed34 r7:ebdb1e60 r6:85367b80 r5:85689800 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:00001000 r4:ecc4f000 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/0:904:5711 blocked for more than 464 seconds. r4:8568a400 r5:8568a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdb9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85377680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8568a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf89000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cc78c r4:856cc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856cc78c r4:85367c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8568a400 r8:85367c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85367c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85367c00 r8:8027ed34 r7:ebdb5e60 r6:85367c80 r5:8568a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdb9fb0 to 0xebdb9ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a4313000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a50b8c r4:85a50800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8568b000 r5:8568b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a4313000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:906:5715 blocked for more than 464 seconds. r10:829187f4 r9:ebdc1d84 r8:00000002 r7:60000113 r6:ebdc1d8c r5:8568bc00 r5:8568bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdc1e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8568bc00 r8:85367e2c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:00001000 r4:ecc4f000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/1:385:5718 blocked for more than 464 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebdc5d84 r8:00000002 r7:60000013 r6:ebdc5d8c r5:8568c800 r4:8568c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8568c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdc5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471ea40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8568c800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7af000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847ea38c r4:847ea000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847ea38c r4:8535e800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8568c800 r8:8535e82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8535e800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535e800 r8:8027ed34 r7:eb9cde60 r6:85367f00 r5:8568c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdc5fb0 to 0xebdc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8471e880 INFO: task kworker/1:385:5718 is blocked on a mutex likely owned by task kworker/0:416:4498. Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:386 state:D stack:0 pid:5719 tgid:5719 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8568d400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdc9e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:855a038c r4:8535e880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8568d400 r8:8535e8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8535e880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535e880 r8:8027ed34 r7:eb9cde60 r6:85367f80 r5:8568d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdc9fb0 to 0xebdc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8471eb40 INFO: task kworker/1:386:5719 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a4eb5000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8568e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdcde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471ed40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8568e000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e9b8c r4:847e9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8535e900 r8:8027ed34 r7:ebdc9e60 r6:855ee000 r5:8568e000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:388:5724 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:388 state:D stack:0 pid:5724 tgid:5724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebdbdd84 r8:00000002 r7:60000013 r6:ebdbdd8c r5:85665400 r4:85665400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85665400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdbde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471edc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85665400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb825000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e978c r4:847e9400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e978c r4:8535e980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85665400 r8:8535e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8535e980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535e980 r8:8027ed34 r7:ebdc9e60 r6:8535ea00 r5:85665400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdbdfb0 to 0xebdbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8471ee80 INFO: task kworker/1:388:5724 is blocked on a mutex likely owned by task kworker/0:416:4498. r4:00000000 9d60: 80070013 ffffffff r4:eaec9dc0 r4:00000000 r5:00001000 r4:ecc4f000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:389 state:D stack:0 pid:5726 tgid:5726 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85664800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdd9e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8535ea80 r8:8027ed34 r7:ebdc9e60 r6:8535eb00 r5:85664800 r4:8471ee00 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:390:5727 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:390 state:D stack:0 pid:5727 tgid:5727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebdd1d84 r8:00000002 r7:60000113 r6:ebdd1d8c r5:854c8000 r4:854c8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdd1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471e600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb951000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a078c r4:855a0400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a078c r4:8535eb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c8000 r8:8535ebac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8535eb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535eb80 r8:8027ed34 r7:ebdd9e60 r6:8535ec00 r5:854c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdd1fb0 to 0xebdd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:854c6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:855a0f8c r4:8535ec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c6c00 r8:8535ecac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8535ec80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8535ec80 r8:8027ed34 r7:ebdd9e60 r6:8535ed00 r5:854c6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdddfb0 to 0xebdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8471e040 INFO: task kworker/1:391:5730 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a57e9000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:856e8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ae580 r7:ddde2d40 r6:83018200 r5:855a138c r4:8535ed80 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/1:393:5734 blocked for more than 465 seconds. r5:856e8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebde5fb0 to 0xebde5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8471e480 INFO: task kworker/1:393:5734 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a5b16000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:394:5735 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:5735 tgid:5735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:856e9800 r5:856e9800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:85496100 Call trace: 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:395 state:D stack:0 pid:5738 tgid:5738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebde9d84 r8:00000002 r7:60000113 r6:ebde9d8c r5:856ea400 r4:856ea400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856ea400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebde9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85496300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba3f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a1f8c r4:855a1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a1f8c r4:85608080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ea400 r8:856080ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85608080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85608080 r8:8027ed34 r7:ebde5e60 r6:85608100 r5:856ea400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r4:00000000 r5:85a50b8c r4:85a50800 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 task:kworker/1:396 state:D stack:0 pid:5740 tgid:5740 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856eb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdf5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:856eb000 r8:856081ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85496340 INFO: task kworker/1:396:5740 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a63b3000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:397 state:D stack:0 pid:5742 tgid:5742 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856ebc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdf9e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85608280 r8:8027ed34 r7:ebdf5e60 r6:85608300 r5:856ebc00 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:5744 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:5744 tgid:5744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebdfdd84 r8:00000002 r7:60000113 r6:ebdfdd8c r5:856ec800 r4:856ec800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856ec800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdfde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85496880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbdb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2b8c r4:855a2800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a2b8c r4:85608380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ec800 r8:856083ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85608380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdfdfb0 to 0xebdfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85496780 INFO: task kworker/1:398:5744 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:85a50b8c r4:85a50800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:856ed400 r4:829187f0 r4:00000000 r9:83018205 r8:856ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 r7:ddde2d40 r6:83018200 r5:855a2f8c r4:85608480 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ebe05d84 r8:00000002 r7:60000013 r6:ebe05d8c r5:856ee000 r5:856ee000 r4:829187f0 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a338c r4:85608580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ee000 r8:856085ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85608580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85608580 r8:8027ed34 r7:ebe01e60 r6:85608600 r5:856ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe05fb0 to 0xebe05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85496b00 INFO: task kworker/1:400:5748 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a66a8000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:401 state:D stack:0 pid:5749 tgid:5749 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856eec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdf1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85496e40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc1f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a3b8c r4:855a3800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a3b8c r4:85608680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856eec00 r8:856086ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85608680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85608680 r8:8027ed34 r7:ebe05e60 r6:85608700 r5:856eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdf1fb0 to 0xebdf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85496c80 INFO: task kworker/1:401:5749 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a6c3c000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r5:85a50b8c r4:85a50800 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:856f0000 r5:856f0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe09e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85496cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc05000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a378c r4:855a3400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a378c r4:85608780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f0000 r8:856087ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85608780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85608780 r8:8027ed34 r7:ebdf1e60 r6:85608800 r5:856f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe09fb0 to 0xebe09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85496e00 INFO: task kworker/1:402:5752 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a6c3c000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:403:5754 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:5754 tgid:5754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebe11d84 r8:00000002 r7:60000113 r6:ebe11d8c r5:856f0c00 r4:856f0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe11e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85494480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc75000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a4f8c r4:856a4c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a4f8c r4:85608880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f0c00 r8:856088ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85608880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85608880 r8:8027ed34 r7:ebdf1e60 r6:85608900 r5:856f0c00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:404 state:D stack:0 pid:5756 tgid:5756 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856f1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe15e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85494000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc4b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a438c r4:856a4000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a438c r4:85608980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f1800 r8:856089ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85608980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85608980 r8:8027ed34 r7:ebe11e60 r6:85608a00 r5:856f1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe15fb0 to 0xebe15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85494100 INFO: task kworker/1:404:5756 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:405 state:D stack:0 pid:5759 tgid:5759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebe19d84 r8:00000002 r7:60000113 r6:ebe19d8c r5:856f2400 r4:856f2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f2400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe19e08 r5:856a478c r4:856a4400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a478c r4:85608a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f2400 r8:85608aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85608a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85608a80 r8:8027ed34 r7:ebe11e60 r6:85608b00 r5:856f2400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:856f3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:856a4b8c r4:85608b80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:856f3c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe21e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853775c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cc38c r4:856cc000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856cc38c r4:855ee080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f3c00 r8:855ee0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee080 r8:8027ed34 r7:ebdb9e60 r6:85608c80 r5:856f3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe21fb0 to 0xebe21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85377400 INFO: task kworker/0:907:5765 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ecc4f000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:908 state:D stack:0 pid:5766 tgid:5766 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856f4800 r4:829187f0 r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebe0dfb0 to 0xebe0dff8) INFO: task kworker/0:908:5766 is blocked on a mutex likely owned by task kworker/0:416:4498. [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ecc4f000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:407 state:D stack:0 pid:5767 tgid:5767 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856f5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe31e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbcb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a6b8c r4:856a6800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a6b8c r4:85608d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f5400 r8:85608dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85608d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85608d80 r8:8027ed34 r7:ebe11e60 r6:85608e00 r5:856f5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe31fb0 to 0xebe31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854945c0 INFO: task kworker/1:407:5767 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a7b4c000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 r4:00000000 r5:85a50b8c r4:85a50800 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:851e4ec0 task:kworker/1:408 state:D stack:0 pid:5768 tgid:5768 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:909:5771 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:856f8c00 r4:829187f0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a8222000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:911:5774 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:911 state:D stack:0 pid:5774 tgid:5774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebe4dd84 r8:00000002 r7:60000113 r6:ebe4dd8c r5:856f8000 r5:856f8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:409 state:D stack:0 pid:5776 tgid:5776 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856fb000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe45e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85494dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a578c r4:856a5400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a578c r4:8537b100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fb000 r8:8537b12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8537b100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8537b100 r8:8027ed34 r7:ebe31e60 r6:8537b180 r5:856fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe45fb0 to 0xebe45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:409:5776 is blocked on a mutex likely owned by task kworker/0:416:4498. r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:856fbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe25e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a5f8c r4:856a5c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a5f8c r4:8537b200 r4:8537b200 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d60: 80070013 ffffffff r4:eaec9dc0 r5:00001000 r4:ecc4f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ebe59d84 r8:00000002 r7:60000113 r6:ebe59d8c r5:856fe000 r5:856fe000 r4:829187f0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:856fe000 r8:855ee32c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:913:5783 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:913 state:D stack:0 pid:5783 tgid:5783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebe61d84 r8:00000002 r7:60000113 r6:ebe61d8c r5:856fd400 r4:856fd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856fd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe61e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:856fd400 r8:855ee3ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaec9dc0 r5:00001000 r4:ecc4f000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:856fec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe65e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85377f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb85b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cdf8c r4:856cdc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856cdf8c r4:855ee400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fec00 r8:855ee42c r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee400 r8:8027ed34 r7:ebe61e60 r6:8537b400 r5:856fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe65fb0 to 0xebe65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85377d40 INFO: task kworker/0:914:5784 is blocked on a mutex likely owned by task kworker/0:416:4498. 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:856fc800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Call trace: 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:856f9800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856cf78c r4:855ee500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f9800 r8:855ee52c r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee500 r8:8027ed34 r7:ebe61e60 r6:8537b500 r5:856f9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe75fb0 to 0xebe75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85377f80 INFO: task kworker/0:916:5788 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:85700c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:61c88647 r9:85700c00 r8:855ee5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000000 r4:eaec9dc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:851e4ec0 r5:85703000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe89e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8437b000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85703000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb92b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cef8c r4:856cec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856cef8c r4:855ee600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85703000 r8:855ee62c r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee600 r8:8027ed34 r7:ebe75e60 r6:8537b600 r5:85703000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe89fb0 to 0xebe89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8437b100 INFO: task kworker/0:918:5793 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a9d70000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85701800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8437b2c0 INFO: task kworker/0:919:5794 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: a9d70000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Not tainted 6.15.0-syzkaller #0 r5:85703c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:856cfb8c r4:856cf800 r4:855ee700 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85704800 r4:829187f0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85704800 r8:855ee7ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:922:5801 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:922 state:D stack:0 pid:5801 tgid:5801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebea5d84 r8:00000002 r7:60000113 r6:ebea5d8c r5:85706000 r5:85706000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:856d038c r4:856d0000 Exception stack(0xebea5fb0 to 0xebea5ff8) 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r5:00001000 r4:ecc4f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85706c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8437bcc0 r7:dddced40 r6:83018000 r5:856d138c r4:855ee880 Exception stack(0xebea9fb0 to 0xebea9ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: aa7de000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:924:5804 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred r5:85705400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebeade08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8437b8c0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85705400 r8:855ee92c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84b9b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8437b9c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe39fb0 to 0xebe39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8437b880 INFO: task kworker/0:925:5807 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d60: 80070013 ffffffff r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 9fa0: 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84b9bc00 r4:829187f0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:927:5810 blocked for more than 465 seconds. r4:84b9c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b9c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebeb9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8437bf40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd25000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d1b8c r4:856d1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d1b8c r4:855eeb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9c800 r8:855eebac r7:82804d40 r6:dddced40 r5:dddced60 r4:855eeb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eeb80 r8:8027ed34 r7:ebea9e60 r6:855eec00 r5:84b9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebeb9fb0 to 0xebeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8437ba80 INFO: task kworker/0:927:5810 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: aaf43000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84b9d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:856d178c r4:855eec80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: ab3df000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:929 state:D stack:0 pid:5815 tgid:5815 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84b9e000 r4:829187f0 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000000 r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 r5:00001000 r4:ecc4f000 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:930 state:D stack:0 pid:5818 tgid:5818 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84b9ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560a000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/0:931:5819 blocked for more than 465 seconds. r5:84b9a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d2b8c r4:856d2800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d2b8c r4:855eef80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9a400 r8:855eefac r7:82804d40 r6:dddced40 r5:dddced60 r4:855eef80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eef80 r8:8027ed34 r7:ebe51e60 r6:85363000 r5:84b9a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebec5fb0 to 0xebec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8560a080 INFO: task kworker/0:931:5819 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: abc16000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:ebed5d84 r8:00000002 r7:60000113 r6:ebed5d8c r5:84b98000 r5:84b98000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560a200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85363080 r8:8027ed34 r7:ebec5e60 r6:85363100 r5:84b98000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebed5fb0 to 0xebed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8560a080 INFO: task kworker/0:932:5820 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: abc16000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:851e4ec0 r4:84b99800 r5:84b99800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:933:5824 is blocked on a mutex likely owned by task kworker/0:416:4498. r5:80070013 r4:80239bd0 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:934:5825 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:934 state:D stack:0 pid:5825 tgid:5825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebed9d84 r8:00000002 r7:60000113 r6:ebed9d8c r5:84b98c00 r4:84b98c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b98c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebed9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560a640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b98c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd71000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d2f8c r4:856d2c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d2f8c r4:85363280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b98c00 r8:853632ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85363280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363280 r8:8027ed34 r7:ebed1e60 r6:85363300 r5:84b98c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebed9fb0 to 0xebed9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8560a680 INFO: task kworker/0:934:5825 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:935:5827 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:935 state:D stack:0 pid:5827 tgid:5827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebecdd84 r8:00000002 r7:60000013 r6:ebecdd8c r5:85730000 r4:85730000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85730000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebecde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560a980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85730000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd8f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d378c r4:856d3400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d378c r4:85363380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85730000 r8:853633ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85363380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363380 r8:8027ed34 r7:ebed1e60 r6:85363400 r5:85730000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebecdfb0 to 0xebecdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/0:936 state:D stack:0 pid:5829 tgid:5829 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85730c00 r4:829187f0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:00000000 r9:85363480 r8:8027ed34 r7:ebecde60 r6:85363500 r5:85730c00 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:937:5831 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:937 state:D stack:0 pid:5831 tgid:5831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebee9d84 r8:00000002 r7:60000113 r6:ebee9d8c r5:85732400 r4:85732400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85732400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebee9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560abc0 r7:dddced40 r6:83018000 r5:856d3b8c r4:85363580 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:eaec9dc0 r5:00001000 r4:ecc4f000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:938:5833 blocked for more than 466 seconds. r5:85709800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560ae80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85709800 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e038c r4:856e0000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856e038c r4:85363680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85709800 r8:853636ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85363680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363680 r8:8027ed34 r7:ebee5e60 r6:8537b980 r5:85709800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc9fb0 to 0xebbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8560aa80 INFO: task kworker/0:938:5833 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: ad8a1000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:939 state:D stack:0 pid:5835 tgid:5835 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85708c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebeedfb0 to 0xebeedff8) INFO: task kworker/0:939:5835 is blocked on a mutex likely owned by task kworker/0:416:4498. Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: adc50000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:940 state:D stack:0 pid:5837 tgid:5837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebef1d84 r8:00000002 r7:60000113 r6:ebef1d8c r5:85708000 r4:85708000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85708000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebef1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f4380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85708000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb48f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:eaec9dc0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:941 state:D stack:0 pid:5840 tgid:5840 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85733000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebef5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:856e0b8c r4:85363800 Exception stack(0xebef5fb0 to 0xebef5ff8) INFO: task kworker/0:941:5840 is blocked on a mutex likely owned by task kworker/0:416:4498. r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:942:5841 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:942 state:D stack:0 pid:5841 tgid:5841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebef9d84 r8:00000002 r7:60000013 r6:ebef9d8c r5:85731800 r4:85731800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85731800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebef9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f4800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85731800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb62f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:943:5842 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:943 state:D stack:0 pid:5842 tgid:5842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebefdd84 r8:00000002 r7:60000113 r6:ebefdd8c r5:85734800 r4:85734800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85734800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebefde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f4640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85734800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856e138c r4:856e1000 r4:85363a00 dfa0: 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/0:944:5845 blocked for more than 466 seconds. r4:85735400 r5:85735400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:856e1f8c r4:856e1c00 r10:61c88647 r9:85735400 r8:85363b2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f4a40 INFO: task kworker/0:944:5845 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: aef42000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:945:5846 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:945 state:D stack:0 pid:5846 tgid:5846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebf05d84 r8:00000002 r7:60000013 r6:ebf05d8c r5:85736000 r4:85736000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85736000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf05e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f4900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85736000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:856e1b8c r4:85363c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85736000 r8:85363c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85363c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363c00 r8:8027ed34 r7:ebee1e60 r6:85363c80 r5:85736000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf05fb0 to 0xebf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f4a40 INFO: task kworker/0:945:5846 is blocked on a mutex likely owned by task kworker/0:416:4498. Call trace: [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:946:5849 blocked for more than 466 seconds. r5:85736c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85736c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e238c r4:856e2000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856e238c r4:85363d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85736c00 r8:85363d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85363d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363d00 r8:8027ed34 r7:ebee1e60 r6:85363d80 r5:85736c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf09fb0 to 0xebf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f4ac0 INFO: task kworker/0:946:5849 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r5:85a50b8c r4:85a50800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85733c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:85363e00 r4:855f4b80 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:00000000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:948:5853 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:948 state:D stack:0 pid:5853 tgid:5853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebf11d84 r8:00000002 r7:60000013 r6:ebf11d8c r5:8568ec00 r4:8568ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8568ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf11e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85494880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8568ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb94f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebf11fb0 to 0xebf11ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:85a50b8c r4:85a50800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:851e4ec0 INFO: task kworker/0:949:5855 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:949 state:D stack:0 pid:5855 tgid:5855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebf1dd84 r8:00000002 r7:60000013 r6:ebf1dd8c r5:8570bc00 r4:8570bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8570bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf1de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5d080 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8570bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba3d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e338c r4:856e3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856e338c r4:85517000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570bc00 r8:8551702c r7:82804d40 r6:dddced40 r5:dddced60 r4:85517000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517000 r8:8027ed34 r7:ebf11e60 r6:8537bb00 r5:8570bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf1dfb0 to 0xebf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000001 task:kworker/0:950 state:D stack:0 pid:5856 tgid:5856 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8570c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf21e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560af00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8570c800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb975000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e2f8c r4:856e2c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856e2f8c r4:85517080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570c800 r8:855170ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85517080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517080 r8:8027ed34 r7:ebf1de60 r6:8537bb80 r5:8570c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf21fb0 to 0xebf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b0536000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r4:eaec9dc0 r5:00001000 r4:ecc4f000 r4:00000001 r4:851e4ec0 r4:8570d400 r5:8570d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:8570d400 r8:8537bc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Call trace: Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b0536000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:951:5861 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:951 state:D stack:0 pid:5861 tgid:5861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8570e000 r5:8570e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:951:5861 is blocked on a mutex likely owned by task kworker/0:416:4498. 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:5864 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:412 state:D stack:0 pid:5864 tgid:5864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebf01d84 r8:00000002 r7:60000113 r6:ebf01d8c r5:8570ec00 r4:8570ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8570ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf01e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:856a678c r4:856a6400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85522880 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:85a50b8c r4:85a50800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:851e4ec0 task:kworker/0:952 state:D stack:0 pid:5865 tgid:5865 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8570b000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf2de08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:413:5867 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:5867 tgid:5867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebf39d84 r8:00000002 r7:60000113 r6:ebf39d8c r5:8570a400 r4:8570a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8570a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf39e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8570a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a6f8c r4:856a6c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a6f8c r4:8537bf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570a400 r8:8537bf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8537bf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8537bf00 r8:8027ed34 r7:ebe31e60 r6:8537bf80 r5:8570a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:5870 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:5870 tgid:5870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebf3dd84 r8:00000002 r7:60000113 r6:ebf3dd8c r5:85702400 r4:85702400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85702400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf3de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:855f2000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f2000 r8:8027ed34 r7:ebf39e60 r6:855f2080 r5:85702400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf3dfb0 to 0xebf3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85522c80 INFO: task kworker/1:414:5870 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:85a50b8c r4:85a50800 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:415 state:D stack:0 pid:5871 tgid:5871 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85700000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:856a778c r4:856a7400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85710c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5d680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85710c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e3b8c r4:856e3800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856e3b8c r4:85517200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85710c00 r8:8551722c r7:82804d40 r6:dddced40 r5:dddced60 r4:85517200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517200 r8:8027ed34 r7:ebf19e60 r6:855f2200 r5:85710c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf51fb0 to 0xebf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5d700 INFO: task kworker/0:953:5874 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b1c01000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85710000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5dc40 r7:dddced40 r6:83018000 r5:85774f8c r4:85517280 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d60: 80070013 ffffffff r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:955:5877 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:955 state:D stack:0 pid:5877 tgid:5877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebf5dd84 r8:00000002 r7:60000013 r6:ebf5dd8c r5:85712400 r4:85712400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85712400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf5de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5d800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85712400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc0b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577438c r4:85774000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577438c r4:85517300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85712400 r8:8551732c r7:82804d40 r6:dddced40 r5:dddced60 r4:85517300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517300 r8:8027ed34 r7:ebf59e60 r6:855f2300 r5:85712400 r4:84a5d940 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaec9d20 to 0xeaec9d68) r4:82ac11e4 r4:eaec9dc0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:956:5879 blocked for more than 466 seconds. task:kworker/0:956 state:D stack:0 pid:5879 tgid:5879 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85711800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ebc21000 r4:00000001 INFO: task kworker/0:956:5879 is blocked on a mutex likely owned by task kworker/0:416:4498. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85713000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf6de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5da00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85713000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc43000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85774b8c r4:85774800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85774b8c r4:85517400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85713000 r8:8551742c r7:82804d40 r6:dddced40 r5:dddced60 r4:85517400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517400 r8:8027ed34 r7:ebf59e60 r6:855f2400 r5:85713000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf6dfb0 to 0xebf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5dcc0 INFO: task kworker/0:957:5881 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b2b54000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf75e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85715400 r8:855174ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b312c000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:959:5885 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec785e08 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:ebc73000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/0:960:5887 blocked for more than 466 seconds. Call trace: [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec791e08 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:85775f8c r4:85775c00 Exception stack(0xec791fb0 to 0xec791ff8) r4:00000000 r4:82ac11e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a50b8c r4:85a50800 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/0:961:5889 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:961 state:D stack:0 pid:5889 tgid:5889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec799d84 r8:00000002 r7:60000113 r6:ec799d8c r5:85713c00 r4:85713c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85713c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec799e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:85716c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577638c r4:85776000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577638c r4:85517680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85716c00 r8:855176ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85517680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517680 r8:8027ed34 r7:ec791e60 r6:855f2680 r5:85716c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a1fb0 to 0xec7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5df80 INFO: task kworker/0:962:5891 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b3fb8000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/0:963:5893 blocked for more than 466 seconds. r10:829187f4 r9:ec7b5d84 r8:00000002 r7:60000013 r6:ec7b5d8c r5:85718c00 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b5e08 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:ec7b1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577678c r4:85776400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577678c r4:85517700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85718c00 r8:8551772c r7:82804d40 r6:dddced40 r5:dddced60 r4:85517700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517700 r8:8027ed34 r7:ec7a1e60 r6:855f2700 r5:85718c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7b5fb0 to 0xec7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85515040 INFO: task kworker/0:963:5893 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b3fb8000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r5:85a50b8c r4:85a50800 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 Not tainted 6.15.0-syzkaller #0 r4:85718000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c1e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec7c1fb0 to 0xec7c1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85515200 INFO: task kworker/0:964:5895 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b4480000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 r5:85a50b8c r4:85a50800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85719800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d1e08 r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85517800 r8:8027ed34 r7:ec7c1e60 r6:855f2800 r5:85719800 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85776f8c r4:85776c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b456e000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:967:5901 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:967 state:D stack:0 pid:5901 tgid:5901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec7edd84 r8:00000002 r7:60000013 r6:ec7edd8c r5:8571b000 r4:8571b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8571b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7ede08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855156c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8571b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:968:5903 blocked for more than 466 seconds. Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:8571bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85777b8c r4:85517980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:855179ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85517980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517980 r8:8027ed34 r7:ec7ede60 r6:855f2980 r5:8571bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f9fb0 to 0xec7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855154c0 INFO: task kworker/0:968:5903 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b4d87000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r5:80070013 r4:80239bd0 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:969:5905 blocked for more than 466 seconds. r5:8571c800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec809e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe81e08 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8571d400 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85777f8c r4:85777c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85777f8c r4:85517a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571d400 r8:85517aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85517a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517a80 r8:8027ed34 r7:ec809e60 r6:855f2a80 r5:8571d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe81fb0 to 0xebe81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855159c0 INFO: task kworker/0:970:5907 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b562f000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:971 state:D stack:0 pid:5909 tgid:5909 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec815e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85517b00 r8:8027ed34 r7:ec809e60 r6:855f2b00 r5:8571e000 INFO: task kworker/0:971:5909 is blocked on a mutex likely owned by task kworker/0:416:4498. [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ecc4f000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:972 state:D stack:0 pid:5911 tgid:5911 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec81de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85515bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8571ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb087000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577878c r4:85778400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577878c r4:85517b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571ec00 r8:85517bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85517b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517b80 r8:8027ed34 r7:ec809e60 r6:855f2b80 r5:8571ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec81dfb0 to 0xec81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85515a00 INFO: task kworker/0:972:5911 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b5c3e000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:973:5913 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:973 state:D stack:0 pid:5913 tgid:5913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec825d84 r8:00000002 r7:60000113 r6:ec825d8c r5:857b0c00 r4:857b0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857b0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec825e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85515c40 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85517c00 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb865000 r4:85517c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517c80 r8:8027ed34 r7:ec809e60 r6:855f2c80 r5:857b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec82dfb0 to 0xec82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85515d40 INFO: task kworker/0:974:5915 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b607f000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:851e4ec0 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec835e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:8577938c r4:85779000 r10:00000000 r9:85517d00 r8:8027ed34 r7:ec82de60 r6:855f2d00 r5:857b1800 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:857b2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec845e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ae840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb74b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577978c r4:85779400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577978c r4:85517d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b2400 r8:85517dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85517d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517d80 r8:8027ed34 r7:ec82de60 r6:855f2d80 r5:857b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec845fb0 to 0xec845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552cb80 INFO: task kworker/0:976:5919 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b67c1000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b6a24000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:ec851d84 r8:00000002 r7:60000113 r6:ec851d8c r5:857b5400 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec851e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577a38c r4:8577a000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577a38c r4:85517f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b4800 r8:85517f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85517f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517f00 r8:8027ed34 r7:ec851e60 r6:855f2f00 r5:857b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec86dfb0 to 0xec86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e2400 INFO: task kworker/0:979:5925 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b6d7a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec875e08 r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577a78c r4:8577a400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577a78c r4:85534000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b6000 r8:8553402c r7:82804d40 r6:dddced40 r5:dddced60 r4:85534000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85534000 r8:8027ed34 r7:ec851e60 r6:855f2f80 r5:857b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec875fb0 to 0xec875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e21c0 INFO: task kworker/0:980:5927 is blocked on a mutex likely owned by task kworker/0:416:4498. Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:eaec9dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ec885d84 r8:00000002 r7:60000113 r6:ec885d8c r5:857b6c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec885e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ebc89000 r5:8577bb8c r4:8577b800 r10:00000000 r9:85534080 r8:8027ed34 r7:ec851e60 r6:8551f000 r5:857b6c00 Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:982:5931 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:982 state:D stack:0 pid:5931 tgid:5931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec88dd84 r8:00000002 r7:60000013 r6:ec88dd8c r5:857b3000 r4:857b3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857b3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec88de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e25c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577af8c r4:8577ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577af8c r4:85534100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b3000 r8:8553412c r7:82804d40 r6:dddced40 r5:dddced60 r4:85534100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85534100 r8:8027ed34 r7:ec885e60 r6:8551f080 r5:857b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec88dfb0 to 0xec88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:855e2500 Call trace: 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec841e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8577b38c r4:8577b000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84be2400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec891e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d60: 80070013 ffffffff [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a50b8c r4:85a50800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ebf49d84 r8:00000002 r7:60000113 r6:ebf49d8c r5:84be3000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf49e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8577bf8c r4:8577bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577bf8c r4:85534380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be3000 r8:855343ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85534380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85534380 r8:8027ed34 r7:ec885e60 r6:85534400 r5:84be3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf49fb0 to 0xebf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e2a80 INFO: task kworker/0:985:5937 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b7d37000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84be3c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec899e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:84be3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r4:85534480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeaec9d20 to 0xeaec9d68) [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:ecc4f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:987:5942 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:987 state:D stack:0 pid:5942 tgid:5942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8a1d84 r8:00000002 r7:60000013 r6:ec8a1d8c r5:84be4800 r4:84be4800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84be4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e2980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84be4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd27000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577c38c r4:8577c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577c38c r4:85534580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be4800 r8:855345ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85534580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85534580 r8:8027ed34 r7:ec899e60 r6:85534600 r5:84be4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a1fb0 to 0xec8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e2d80 INFO: task kworker/0:987:5942 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaec9d20 to 0xeaec9d68) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 task:kworker/0:988 state:D stack:0 pid:5944 tgid:5944 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a5e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b8bae000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:989:5945 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:989 state:D stack:0 pid:5945 tgid:5945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec89dd84 r8:00000002 r7:60000113 r6:ec89dd8c r5:84be6000 r5:84be6000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec89de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be6000 r8:855347ac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:990:5948 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:990 state:D stack:0 pid:5948 tgid:5948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8a9d84 r8:00000002 r7:60000013 r6:ec8a9d8c r5:84be6c00 r4:84be6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84be6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f0240 r5:8577cf8c r4:8577cc00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80070013 ffffffff r5:85a50b8c r4:85a50800 Exception stack(0xeaec9fb0 to 0xeaec9ff8) Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:ec8b1d84 r8:00000002 r7:60000113 r6:ec8b1d8c r5:84be0000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84be0000 r8:855349ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:85a50b8c r4:85a50800 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:992:5952 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:992 state:D stack:0 pid:5952 tgid:5952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8cdd84 r8:00000002 r7:60000013 r6:ec8cdd8c r5:84be0c00 r4:84be0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84be0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8cde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f0640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84be0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe27000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577db8c r4:8577d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577db8c r4:85534a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be0c00 r8:85534aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85534a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85534a80 r8:8027ed34 r7:ec89de60 r6:85534b00 r5:84be0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8cdfb0 to 0xec8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f0500 INFO: task kworker/0:992:5952 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b953f000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d1e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: b9844000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:994:5956 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:994 state:D stack:0 pid:5956 tgid:5956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8d5d84 r8:00000002 r7:60000113 r6:ec8d5d8c r5:85740c00 r4:85740c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8577e38c r4:8577e000 r10:61c88647 r9:85740c00 r8:85534cac r7:82804d40 r6:dddced40 r5:dddced60 r4:857f0840 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:995:5958 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:ec8d9d84 r8:00000002 r7:60000113 r6:ec8d9d8c r5:85741800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85534d80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:996:5960 blocked for more than 467 seconds. [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ade08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f0c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85742400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe77000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577eb8c r4:8577e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577eb8c r4:85534f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85742400 r8:85534f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85534f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85534f00 r8:8027ed34 r7:ec8d9e60 r6:85534f80 r5:85742400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8adfb0 to 0xec8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f0d40 INFO: task kworker/0:996:5960 is blocked on a mutex likely owned by task kworker/0:416:4498. r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:85743000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8dde08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:85534e80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:85a50b8c r4:85a50800 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:998:5965 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:998 state:D stack:0 pid:5965 tgid:5965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec7a5d84 r8:00000002 r7:60000013 r6:ec7a5d8c r5:85743c00 r4:85743c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85743c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858040c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85743c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4bd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/0:999:5967 blocked for more than 467 seconds. r4:85745400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858045c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85745400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb83f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577ff8c r4:8577fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577ff8c r4:85800100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85745400 r8:8580012c r7:82804d40 r6:dddced40 r5:dddced60 r4:85800100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85800100 r8:8027ed34 r7:ec7a5e60 r6:85800180 r5:85745400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e1fb0 to 0xec8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85804180 INFO: task kworker/0:999:5967 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: ba56c000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:851e4ec0 task:kworker/0:1000 state:D stack:0 pid:5968 tgid:5968 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8577fb8c r4:8577f800 r10:61c88647 r9:85746000 r8:8580022c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80070013 ffffffff r4:00000000 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851e4ec0 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r5:00001000 r4:ebc15000 r7:ddde2d40 r6:83018200 r5:856a7b8c r4:8551f100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85746c00 r8:8551f12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8551f100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551f100 r8:8027ed34 r7:ebf3de60 r6:85800300 r5:85746c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7e1fb0 to 0xec7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85807100 INFO: task kworker/1:416:5972 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: bae55000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1001:5974 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85744800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:00001000 r4:eb967000 r10:61c88647 r9:85744800 r8:858003ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec805d84 r8:00000002 r7:60000013 r6:ec805d8c r5:857ba400 r4:857ba400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857ba400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec805e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85804d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578d38c r4:8578d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578d38c r4:85800480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ba400 r8:858004ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85800480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85800480 r8:8027ed34 r7:ec7b9e60 r6:8551f180 r5:857ba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec805fb0 to 0xec805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85804780 INFO: task kworker/0:1002:5976 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: bb180000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1003:5977 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1003 state:D stack:0 pid:5977 tgid:5977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85804880 r5:8578c78c r4:8578c400 r10:61c88647 r9:85060000 r8:8580052c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1004:5979 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1004 state:D stack:0 pid:5979 tgid:5979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec7f1d84 r8:00000002 r7:60000113 r6:ec7f1d8c r5:85060c00 r4:85060c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85060c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85804a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85060c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba33000 r5:8578cb8c r4:8578c800 r10:00000000 r9:85800600 r8:8027ed34 r7:ec805e60 r6:85800680 r5:85060c00 r4:85804bc0 Call trace: 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:ecc4f000 r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1005:5981 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1005 state:D stack:0 pid:5981 tgid:5981 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ede08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85804c40 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:1006:5985 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1006 state:D stack:0 pid:5985 tgid:5985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8fdd84 r8:00000002 r7:60000113 r6:ec8fdd8c r5:857bd400 r4:857bd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857bd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8fde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85804e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578d78c r4:8578d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578d78c r4:85800780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857bd400 r8:858007ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85800780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85800780 r8:8027ed34 r7:ec805e60 r6:8551f280 r5:857bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8fdfb0 to 0xec8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85804fc0 INFO: task kworker/0:1006:5985 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: bbf8a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ec901d84 r8:00000002 r7:60000113 r6:ec901d8c r5:857bb000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580e440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebeb1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578e38c r4:8578e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578e38c r4:85800800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857bb000 r8:8580082c r7:82804d40 r6:dddced40 r5:dddced60 r4:85800800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85800800 r8:8027ed34 r7:ec8fde60 r6:8551f300 r5:857bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec901fb0 to 0xec901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85804fc0 INFO: task kworker/0:1007:5986 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1008:5987 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1008 state:D stack:0 pid:5987 tgid:5987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec905d84 r8:00000002 r7:60000113 r6:ec905d8c r5:857b8000 r4:857b8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857b8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec905e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f0a40 r4:00000000 r5:00001000 r4:ebbed000 r7:dddced40 r6:83018000 r5:8578db8c r4:85800880 5fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1009:5989 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1009 state:D stack:0 pid:5989 tgid:5989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:857bc800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec90de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580e040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc03000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578df8c r4:8578dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578df8c r4:85800900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857bc800 r8:8580092c r7:82804d40 r6:dddced40 r5:dddced60 r4:85800900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85800900 r8:8027ed34 r7:ec901e60 r6:8551f400 r5:857bc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec90dfb0 to 0xec90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ec8e5d84 r8:00000002 r7:60000013 r6:ec8e5d8c r5:857bec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85807ec0 r7:ddde2d40 r6:83018200 r5:847eaf8c r4:8551f480 Exception stack(0xec8e5fb0 to 0xec8e5ff8) r4:85807c80 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r5:80070013 r4:80239bd0 r4:00000000 r5:00001000 r4:ecc4f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1010:5994 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1010 state:D stack:0 pid:5994 tgid:5994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec909d84 r8:00000002 r7:60000113 r6:ec909d8c r5:857be000 r4:857be000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857be000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec909e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580e4c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857be000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf4d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578eb8c r4:8578e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578eb8c r4:85800980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857be000 r8:858009ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85800980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85800980 r8:8027ed34 r7:ec901e60 r6:8551f580 r5:857be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec909fb0 to 0xec909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8580e140 INFO: task kworker/0:1010:5994 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: bcac0000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r4:82ac11e4 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85807700 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:419:5997 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:419 state:D stack:0 pid:5997 tgid:5997 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec911d84 r8:00000002 r7:60000113 r6:ec911d8c r5:857b8c00 r4:857b8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857b8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec911e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858170c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf5f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576038c r4:85760000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576038c r4:8551f700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b8c00 r8:8551f72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8551f700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551f700 r8:8027ed34 r7:ec8e9e60 r6:8551f780 r5:857b8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec911fb0 to 0xec911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85807a80 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:00001000 r4:ecc4f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec915e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85807440 r7:ddde2d40 r6:83018200 r5:847ea78c r4:8551f800 r10:00000000 r9:8551f800 r8:8027ed34 r7:ec911e60 r6:8551f880 r5:856f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec915fb0 to 0xec915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858073c0 INFO: task kworker/1:420:5999 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: bd4fa000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:1011 state:D stack:0 pid:6003 tgid:6003 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec925e08 r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85749800 r8:85800a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8580e680 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1012:6004 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1012 state:D stack:0 pid:6004 tgid:6004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec929d84 r8:00000002 r7:60000013 r6:ec929d8c r5:85748c00 r4:85748c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85748c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec929e08 r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec929fb0 to 0xec929ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:421 state:D stack:0 pid:6007 tgid:6007 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec919e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858032c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8574a400 r7:00000000 r6:83018200 r5:00001000 r4:7f109000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca13000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f2b8c r4:847f2800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f2b8c r4:8551fa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574a400 r8:8551fa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8551fa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551fa00 r8:8027ed34 r7:ec911e60 r6:8551fa80 r5:8574a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec919fb0 to 0xec919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85817080 INFO: task kworker/1:421:6007 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: bddd6000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:851e4ec0 task:kworker/1:422 state:D stack:0 pid:6008 tgid:6008 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec92de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85803140 r10:61c88647 r9:8574b000 r8:8551fb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85817080 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1013:6009 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1013 state:D stack:0 pid:6009 tgid:6009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec931d84 r8:00000002 r7:60000113 r6:ec931d8c r5:8574bc00 r4:8574bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8574bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec931e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580ea00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8574bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf77000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578f38c r4:8578f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578f38c r4:85800b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574bc00 r8:85800b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85800b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85800b00 r8:8027ed34 r7:ec929e60 r6:8551fc00 r5:8574bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec931fb0 to 0xec931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8580e7c0 INFO: task kworker/0:1013:6009 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: be1f0000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) r4:851e4ec0 Call trace: [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec935e08 r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8578f78c r4:8578f400 r4:85800b80 Exception stack(0xec935fb0 to 0xec935ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8580e600 INFO: task kworker/0:1014:6011 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: be503000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1015:6014 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec941e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec941fb0 to 0xec941ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec921e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580eb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85063000 r8:85800cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85800c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85800c80 r8:8027ed34 r7:ec941e60 r6:85800d00 r5:85063000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec921fb0 to 0xec921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8580ed00 INFO: task kworker/0:1016:6015 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: be7ec000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1017:6018 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1017 state:D stack:0 pid:6018 tgid:6018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec93dd84 r8:00000002 r7:60000013 r6:ec93dd8c r5:85063c00 r4:85063c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85063c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec93de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580eec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85063c00 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579038c r4:85790000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579038c r4:85800d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85063c00 r8:85800dac r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec91de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85064800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85790b8c r4:85790800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85790b8c r4:85800e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85064800 r8:85800eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85800e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85800e80 r8:8027ed34 r7:ec93de60 r6:85800f00 r5:85064800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec91dfb0 to 0xec91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8580e740 INFO: task kworker/0:1018:6019 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: beda6000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf41e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580e380 r7:dddced40 r6:83018000 r5:8579078c r4:85800f80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec85dfb0 to 0xec85dff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1021:6027 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1021 state:D stack:0 pid:6027 tgid:6027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec879d84 r8:00000002 r7:60000113 r6:ec879d8c r5:85748000 r4:85748000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85748000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec879e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85748000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb955000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85791b8c r4:85791800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaec9fb0 to 0xeaec9ff8) Not tainted 6.15.0-syzkaller #0 r5:8574e000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec949e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8574e000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb86b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579138c r4:85791000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579138c r4:8581c200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574e000 r8:8581c22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8581c200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581c200 r8:8027ed34 r7:ec879e60 r6:8551fe00 r5:8574e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec949fb0 to 0xec949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858191c0 INFO: task kworker/0:1022:6028 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: bf898000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec951e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:423:6150 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:423 state:D stack:0 pid:6150 tgid:6150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb49d84 r8:00000002 r7:60000113 r6:ecb49d8c r5:857c3000 r4:857c3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857c3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb49e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858033c0 r10:61c88647 r9:857c3000 r8:847de02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/1:424:6153 blocked for more than 467 seconds. r5:857c4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:847f238c r4:847de100 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:425:6154 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:425 state:D stack:0 pid:6154 tgid:6154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb39d84 r8:00000002 r7:60000013 r6:ecb39d8c r5:857c5400 r4:857c5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857c5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb39e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85803700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f10f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca87000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f1f8c r4:847f1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f1f8c r4:847de200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857c5400 r8:847de22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847de200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847de200 r8:8027ed34 r7:ecb79e60 r6:847de280 r5:857c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb39fb0 to 0xecb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85803340 INFO: task kworker/1:425:6154 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857c0000 r5:857c0000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:427:6159 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:427 state:D stack:0 pid:6159 tgid:6159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb89d84 r8:00000002 r7:60000113 r6:ecb89d8c r5:857c3c00 r4:857c3c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857c3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb89e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85803a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f113000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca99000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f178c r4:847f1400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f178c r4:847de400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857c3c00 r8:847de42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847de400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847de400 r8:8027ed34 r7:ecb81e60 r6:847de480 r5:857c3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb89fb0 to 0xecb89ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:85803780 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 Not tainted 6.15.0-syzkaller #0 r5:857c6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:429:6163 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:429 state:D stack:0 pid:6163 tgid:6163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb85d84 r8:00000002 r7:60000113 r6:ecb85d8c r5:8574ec00 r4:8574ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8574ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb85e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8574ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f11f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecba1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847ebb8c r4:847eb800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847ebb8c r4:847de600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574ec00 r8:847de62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847de600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847de600 r8:8027ed34 r7:ecb8de60 r6:847de680 r5:8574ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb85fb0 to 0xecb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85803b00 INFO: task kworker/1:429:6163 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c1081000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/1:430:6164 blocked for more than 468 seconds. r5:857d0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85803d40 r10:61c88647 r9:857d0000 r8:847de72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85803d00 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r5:85a50b8c r4:85a50800 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:6167 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:6167 tgid:6167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb9dd84 r8:00000002 r7:60000113 r6:ecb9dd8c r5:85066c00 r4:85066c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85066c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb9de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85803e00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85066c00 r7:00000000 r6:83018200 r5:00001000 r4:7f119000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f038c r4:847f0000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f038c r4:847de800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85066c00 r8:847de82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847de800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847de800 r8:8027ed34 r7:ecb85e60 r6:8581c400 r5:85066c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb9dfb0 to 0xecb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85803fc0 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/1:432:6170 blocked for more than 468 seconds. r5:85065400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e6580 r7:ddde2d40 r6:83018200 r5:847ebf8c r4:847de880 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba9fb0 to 0xecba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85803f80 INFO: task kworker/1:432:6170 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c191f000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/1:433:6172 blocked for more than 468 seconds. r5:85061800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:85878000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847de980 r8:8027ed34 r7:ecbb5e60 r6:8581c580 r5:85878000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:435:6175 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:435 state:D stack:0 pid:6175 tgid:6175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbc9d84 r8:00000002 r7:60000113 r6:ecbc9d8c r5:85879800 r4:85879800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85879800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85879800 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df91f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847eb38c r4:847eb000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 task:kworker/1:436 state:D stack:0 pid:6178 tgid:6178 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85878c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85878c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb39000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584c78c r4:8584c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584c78c r4:847dea80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85878c00 r8:847deaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847dea80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847dea80 r8:8027ed34 r7:ecbb5e60 r6:8581c680 r5:85878c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: c2503000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857d0c00 r5:857d0c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:857d1800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb99e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f125000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584cf8c r4:8584cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584cf8c r4:847dec00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d1800 r8:847dec2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847dec00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847dec00 r8:8027ed34 r7:ecb95e60 r6:847dec80 r5:857d1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb99fb0 to 0xecb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85474540 INFO: task kworker/1:438:6181 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c2724000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 INFO: task kworker/1:439:6184 blocked for more than 468 seconds. r5:857d3c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857aab8c r4:847ded00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d3c00 r8:847ded2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ded00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ded00 r8:8027ed34 r7:ecb99e60 r6:847ded80 r5:857d3c00 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:440 state:D stack:0 pid:6188 tgid:6188 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8587bc00 r4:829187f0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfa0: 00000000 00000000 00000000 00000000 9d60: 80070013 ffffffff r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:6190 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:6190 tgid:6190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbe9d84 r8:00000002 r7:60000113 r6:ecbe9d8c r5:8587c800 r4:8587c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8587c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474e00 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8584db8c r4:8584d800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85474c00 INFO: task kworker/1:441:6190 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c2f43000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851e4ec0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8587b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf1e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 Exception stack(0xeaec9fb0 to 0xeaec9ff8) r4:8587ec00 r5:8587ec00 r4:829187f0 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8587ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f153000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc75000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584f38c r4:8584f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584f38c r4:847def80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8587ec00 r8:847defac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847def80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847def80 r8:8027ed34 r7:ecbe9e60 r6:8581c880 r5:8587ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf9fb0 to 0xecbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85474e40 INFO: task kworker/1:443:6194 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xeaec9d20 to 0xeaec9d68) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:8587a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r7:ddde2d40 r6:83018200 r5:8584df8c r4:8585f000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbfdfb0 to 0xecbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85474e40 INFO: task kworker/1:444:6195 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8587e000 r5:8587e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8587e000 r7:00000000 r6:83018200 r5:00001000 r4:7f135000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebccb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9d60: 80070013 ffffffff [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851e4ec0 r5:85880000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85509280 INFO: task kworker/1:446:6199 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c3d6e000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:ecc15d84 r8:00000002 r7:60000013 r6:ecc15d8c r5:85881800 r5:85881800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8585f180 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc15fb0 to 0xecc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85509100 INFO: task kworker/1:447:6201 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c3fc5000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:6203 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:448 state:D stack:0 pid:6203 tgid:6203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc1dd84 r8:00000002 r7:60000013 r6:ecc1dd8c r5:85880c00 r4:85880c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85880c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc1de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c3fc5000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:449:6209 blocked for more than 468 seconds. r10:829187f4 r9:ecbe5d84 r8:00000002 r7:60000013 r6:ecbe5d8c r5:85883000 r5:85883000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85883000 r7:00000000 r6:83018200 r5:00001000 r4:7f155000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc7f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584f78c r4:8584f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584f78c r4:8585f280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85883000 r8:8585f2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585f280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585f280 r8:8027ed34 r7:ecbf9e60 r6:8581cb80 r5:85883000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe5fb0 to 0xecbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:6219 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:6219 tgid:6219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc31d84 r8:00000002 r7:60000113 r6:ecc31d8c r5:85883c00 r4:85883c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85883c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc31e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85883c00 r7:00000000 r6:83018200 r5:00001000 r4:7f157000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8585f300 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:85a50b8c r4:85a50800 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:451:6221 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:451 state:D stack:0 pid:6221 tgid:6221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc19d84 r8:00000002 r7:60000013 r6:ecc19d8c r5:85884800 r4:85884800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85884800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc19e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85884800 r7:00000000 r6:83018200 r5:00001000 r4:7f15f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecca5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85844b8c r4:85844800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85844b8c r4:8585f380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85884800 r8:8585f3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585f380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585f380 r8:8027ed34 r7:ecc31e60 r6:8581cc80 r5:85884800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc19fb0 to 0xecc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85509f40 INFO: task kworker/1:451:6221 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c495a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85885400 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584438c r4:8585f400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85885400 r8:8585f42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585f400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585f400 r8:8027ed34 r7:ecc19e60 r6:8581cd00 r5:85885400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc79fb0 to 0xecc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85509f80 INFO: task kworker/1:452:6223 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eccadd84 r8:00000002 r7:60000013 r6:eccadd8c r5:85886000 r5:85886000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:00001000 r4:ecc9f000 dfa0: 00000000 00000000 00000000 00000000 9d20: c4e04000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:6228 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:6228 tgid:6228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccb9d84 r8:00000002 r7:60000013 r6:eccb9d8c r5:857c6c00 r4:857c6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857c6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb9e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85844f8c r4:85844c00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85842000 INFO: task kworker/1:454:6228 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c4e04000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85886c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858424c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85886c00 r7:00000000 r6:83018200 r5:00001000 r4:7f165000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecccb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584538c r4:85845000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584538c r4:8585f580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85886c00 r8:8585f5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585f580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585f580 r8:8027ed34 r7:eccb9e60 r6:8581ce80 r5:85886c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc5fb0 to 0xeccc5ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r4:84879d00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:456:6233 blocked for more than 468 seconds. r5:85882400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc95e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85882400 r7:00000000 r6:83018200 r5:00001000 r4:7f167000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccd1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584578c r4:85845400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584578c r4:8585f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85882400 r8:8585f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585f600 r8:8027ed34 r7:eccc5e60 r6:8581cf00 r5:85882400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc95fb0 to 0xecc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85842480 INFO: task kworker/1:456:6233 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c5420000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:6235 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:6235 tgid:6235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccd9d84 r8:00000002 r7:60000013 r6:eccd9d8c r5:8587d400 r4:8587d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8587d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccd9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858428c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8587d400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb33000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85845f8c r4:85845c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85845f8c r4:8585f680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8587d400 r8:8585f6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585f680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585f680 r8:8027ed34 r7:ecc95e60 r6:8581cf80 r5:8587d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccd9fb0 to 0xeccd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858425c0 INFO: task kworker/1:457:6235 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c59ac000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:6237 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:6237 tgid:6237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb4dd84 r8:00000002 r7:60000113 r6:ecb4dd8c r5:857d8000 r4:857d8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857d8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb4de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858426c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f169000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccdb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85845b8c r4:85845800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85845b8c r4:8585f700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d8000 r8:8585f72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585f700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585f700 r8:8027ed34 r7:eccd9e60 r6:851b5000 r5:857d8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb4dfb0 to 0xecb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85842600 INFO: task kworker/1:458:6237 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c59ac000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:6242 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:6242 tgid:6242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccb5d84 r8:00000002 r7:60000113 r6:eccb5d8c r5:857d8c00 r4:857d8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857d8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f103000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca07000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85791f8c r4:85791c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85791f8c r4:8585f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d8c00 r8:8585f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585f780 r8:8027ed34 r7:eccd9e60 r6:851b5080 r5:857d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb5fb0 to 0xeccb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85842880 INFO: task kworker/1:459:6242 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c5ce6000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:6243 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:6243 tgid:6243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc9dd84 r8:00000002 r7:60000013 r6:ecc9dd8c r5:857d9800 r4:857d9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857d9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc9de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ed000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf55000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584638c r4:85846000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584638c r4:8585f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d9800 r8:8585f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585f800 r8:8027ed34 r7:eccb5e60 r6:851b5100 r5:857d9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc9dfb0 to 0xecc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85842880 INFO: task kworker/1:460:6243 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c5ce6000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:6244 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:6244 tgid:6244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb55d84 r8:00000002 r7:60000013 r6:ecb55d8c r5:857da400 r4:857da400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857da400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb55e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84adfa80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857da400 r7:00000000 r6:83018200 r5:00001000 r4:7f2d9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f878c r4:847f8400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f878c r4:8585f880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857da400 r8:8585f8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585f880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585f880 r8:8027ed34 r7:eccb5e60 r6:851b5180 r5:857da400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb55fb0 to 0xecb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85842880 INFO: task kworker/1:461:6244 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c6287000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:462:6263 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:462 state:D stack:0 pid:6263 tgid:6263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb59d84 r8:00000002 r7:60000113 r6:ecb59d8c r5:857dc800 r4:857dc800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857dc800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb59e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ff280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f1b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec80d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ff78c r4:857ff400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857ff78c r4:8585f900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857dc800 r8:8585f92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585f900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585f900 r8:8027ed34 r7:ecb55e60 r6:851b5200 r5:857dc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb59fb0 to 0xecb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858373c0 INFO: task kworker/1:462:6263 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c68d3000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:463:6335 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:463 state:D stack:0 pid:6335 tgid:6335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9c9d84 r8:00000002 r7:60000013 r6:ec9c9d8c r5:857dd400 r4:857dd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857dd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84877300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f20d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85869f8c r4:85869c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85869f8c r4:8585fa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857dd400 r8:8585fa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585fa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585fa00 r8:8027ed34 r7:ecb55e60 r6:851b5380 r5:857dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c9fb0 to 0xec9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ff100 INFO: task kworker/1:463:6335 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c68d3000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:6386 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:6386 tgid:6386 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9c5d84 r8:00000002 r7:60000113 r6:ec9c5d8c r5:857de000 r4:857de000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857de000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475c100 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857de000 r7:00000000 r6:83018200 r5:00001000 r4:7f2d5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb33000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f8f8c r4:847f8c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f8f8c r4:8585fa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857de000 r8:8585faac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585fa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585fa80 r8:8027ed34 r7:ecb55e60 r6:851b5400 r5:857de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c5fb0 to 0xec9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84877680 INFO: task kworker/1:464:6386 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c68d3000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:465:6489 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:465 state:D stack:0 pid:6489 tgid:6489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecee1d84 r8:00000002 r7:60000113 r6:ecee1d8c r5:8483c800 r4:8483c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8483c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595cc80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8483c800 r7:00000000 r6:83018200 r5:00001000 r4:7f2d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb73000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f8b8c r4:847f8800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f8b8c r4:8585fb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483c800 r8:8585fb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585fb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585fb00 r8:8027ed34 r7:ecb55e60 r6:851b5480 r5:8483c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecee1fb0 to 0xecee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8595cc80 INFO: task kworker/1:465:6489 is blocked on a mutex likely owned by task kworker/0:416:4498. Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8483d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8483d400 r8:8585fbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:85a50b8c r4:85a50800 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:6493 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:6493 tgid:6493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecef1d84 r8:00000002 r7:60000013 r6:ecef1d8c r5:8483bc00 r4:8483bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8483bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596e0c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8483bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2db000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f838c r4:847f8000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f838c r4:8585fc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483bc00 r8:8585fcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585fc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585fc80 r8:8027ed34 r7:ecee9e60 r6:851b5580 r5:8483bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef1fb0 to 0xecef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596e040 INFO: task kworker/1:467:6493 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c7319000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:00001000 r4:ecc4f000 r5:85a50b8c r4:85a50800 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 r4:851e4ec0 task:kworker/1:468 state:D stack:0 pid:6495 tgid:6495 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8483e000 r5:8483e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596e180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8483e000 r7:00000000 r6:83018200 r5:00001000 r4:7f2dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc09000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f3f8c r4:847f3c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f3f8c r4:8585fc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483e000 r8:8585fc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585fc00 r8:8027ed34 r7:ecee9e60 r6:851b5600 r5:8483e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef9fb0 to 0xecef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596e2c0 INFO: task kworker/1:468:6495 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c7319000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:469:6497 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:469 state:D stack:0 pid:6497 tgid:6497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf01d84 r8:00000002 r7:60000113 r6:ecf01d8c r5:8483ec00 r4:8483ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8483ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf01e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596e300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8483ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f2df000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc29000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f3b8c r4:847f3800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f3b8c r4:8585fd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483ec00 r8:8585fd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585fd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585fd00 r8:8027ed34 r7:ecee9e60 r6:851b5680 r5:8483ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf01fb0 to 0xecf01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596e140 INFO: task kworker/1:469:6497 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c7319000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:6499 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:6499 tgid:6499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf09d84 r8:00000002 r7:60000013 r6:ecf09d8c r5:84838c00 r4:84838c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84838c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf09e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596e3c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84838c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2e3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc6b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Call trace: r4:eaec9dc0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:6502 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:6502 tgid:6502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf11d84 r8:00000002 r7:60000113 r6:ecf11d8c r5:84839800 r4:84839800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84839800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf11e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596e800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84839800 r7:00000000 r6:83018200 r5:00001000 r4:7f2e9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccb1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b0b8c r4:858b0800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b0b8c r4:8585fe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84839800 r8:8585fe2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585fe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585fe00 r8:8027ed34 r7:ecee9e60 r6:851b5780 r5:84839800 Exception stack(0xecf11fb0 to 0xecf11ff8) [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf19d84 r8:00000002 r7:60000113 r6:ecf19d8c r5:8483b000 r4:8483b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8483b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf19e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596e640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8483b000 r7:00000000 r6:83018200 r5:00001000 r4:7f2e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc97000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b078c r4:858b0400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:8483a400 r5:8483a400 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:858b178c r4:8585ff00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483a400 r8:8585ff2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8585ff00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585ff00 r8:8027ed34 r7:ecf11e60 r6:851b5880 r5:8483a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf21fb0 to 0xecf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596e680 INFO: task kworker/1:473:6506 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c860d000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:474 state:D stack:0 pid:6508 tgid:6508 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:857dec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:857dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f2eb000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:857db000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596ea00 r10:61c88647 r9:857db000 r8:8585602c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8596e900 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r5:85a50b8c r4:85a50800 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:476 state:D stack:0 pid:6512 tgid:6512 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858a8c00 r4:829187f0 r4:00000000 r4:00000000 r9:83018205 r8:858a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2f5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd47000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b238c r4:858b2000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b238c r4:85856080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a8c00 r8:858560ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85856080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856080 r8:8027ed34 r7:ecf21e60 r6:851b5a00 r5:858a8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf39fb0 to 0xecf39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596ea40 INFO: task kworker/1:476:6512 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c8df9000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:477 state:D stack:0 pid:6514 tgid:6514 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858a8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf41e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596ecc0 r5:00001000 r4:ecd1d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b1b8c r4:85856100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a8000 r8:8585612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85856100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856100 r8:8027ed34 r7:ecf39e60 r6:851b5a80 r5:858a8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf41fb0 to 0xecf41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596ee00 INFO: task kworker/1:477:6514 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c8df9000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/1:478:6516 blocked for more than 468 seconds. r5:857d3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r9:83018205 r8:857d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f2f3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b1f8c r4:85856180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d3000 r8:858561ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85856180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856180 r8:8027ed34 r7:ecf39e60 r6:85856200 r5:857d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea1fb0 to 0xecea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596ef40 INFO: task kworker/1:478:6516 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c92d3000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/1:479:6519 blocked for more than 468 seconds. r4:857d2400 r5:857d2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:eaec9dc0 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:6520 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:6520 tgid:6520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eceb5d84 r8:00000002 r7:60000013 r6:eceb5d8c r5:857d5400 r4:857d5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857d5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2f9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd77000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b278c r4:858b2400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b278c r4:85856380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d5400 r8:858563ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85856380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856380 r8:8027ed34 r7:ecf45e60 r6:85856400 r5:857d5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceb5fb0 to 0xeceb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596edc0 INFO: task kworker/1:480:6520 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c9db6000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:6524 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:481 state:D stack:0 pid:6524 tgid:6524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf4dd84 r8:00000002 r7:60000013 r6:ecf4dd8c r5:857d4800 r4:857d4800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857d4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf4de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581f240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f2fd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdc5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b2f8c r4:858b2c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b2f8c r4:85856480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d4800 r8:858564ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85856480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856480 r8:8027ed34 r7:ecf45e60 r6:85856500 r5:857d4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf4dfb0 to 0xecf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8581f280 INFO: task kworker/1:481:6524 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: c9ffb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:6526 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:6526 tgid:6526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf55d84 r8:00000002 r7:60000113 r6:ecf55d8c r5:857d6c00 r4:857d6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857d6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf55e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581f100 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2ff000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b338c r4:858b3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b338c r4:85856580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d6c00 r8:858565ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85856580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856580 r8:8027ed34 r7:ecf4de60 r6:85856600 r5:857d6c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:6528 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:6528 tgid:6528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf59d84 r8:00000002 r7:60000113 r6:ecf59d8c r5:857d6000 r4:857d6000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857d6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf59e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581f480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f301000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece6b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b378c r4:858b3400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b378c r4:85856700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d6000 r8:8585672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85856700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856700 r8:8027ed34 r7:ecf55e60 r6:85856780 r5:857d6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf59fb0 to 0xecf59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8581f2c0 INFO: task kworker/1:483:6528 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: ca51e000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85890000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfbeb000 r5:858b3f8c r4:858b3c00 r10:61c88647 r9:85890000 r8:858566ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8581f3c0 INFO: task kworker/1:484:6530 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: ca51e000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:6532 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:6532 tgid:6532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf61d84 r8:00000002 r7:60000113 r6:ecf61d8c r5:85890c00 r4:85890c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85890c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf61e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581f7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85890c00 r7:00000000 r6:83018200 r5:00001000 r4:7f303000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece73000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b3b8c r4:858b3800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b3b8c r4:85856880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85890c00 r8:858568ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85856880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856880 r8:8027ed34 r7:ecf5de60 r6:85856900 r5:85890c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf61fb0 to 0xecf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8581f500 INFO: task kworker/1:485:6532 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: cacd4000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:486 state:D stack:0 pid:6534 tgid:6534 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85891800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf65e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581f980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85891800 r7:00000000 r6:83018200 r5:00001000 r4:7f305000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc2d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b838c r4:858b8000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b838c r4:85856980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85891800 r8:858569ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85856980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856980 r8:8027ed34 r7:ecf5de60 r6:85856a00 r5:85891800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf65fb0 to 0xecf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8581f700 INFO: task kworker/1:486:6534 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: cb2af000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:6536 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:6536 tgid:6536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf69d84 r8:00000002 r7:60000013 r6:ecf69d8c r5:85892400 r4:85892400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85892400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf69e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581fa40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:ec9e5000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:487:6536 is blocked on a mutex likely owned by task kworker/0:416:4498. r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:82ac11e4 r4:00000000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:6538 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:6538 tgid:6538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf6dd84 r8:00000002 r7:60000013 r6:ecf6dd8c r5:85893000 r4:85893000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85893000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf6de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581fb40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85893000 r7:00000000 r6:83018200 r5:00001000 r4:7f309000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca8d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:858b8b8c r4:858b8800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: cb9b8000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/1:489:6540 blocked for more than 469 seconds. r5:85893c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b8f8c r4:85856c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85893c00 r8:85856cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85856c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856c80 r8:8027ed34 r7:ecf6de60 r6:85856d00 r5:85893c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf71fb0 to 0xecf71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8581fb80 INFO: task kworker/1:489:6540 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: cb9b8000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/1:490:6542 blocked for more than 469 seconds. r5:85894800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859788c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85894800 r7:00000000 r6:83018200 r5:00001000 r4:7f30d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b938c r4:858b9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b938c r4:85856d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85894800 r8:85856dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85856d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856d80 r8:8027ed34 r7:ecf71e60 r6:85856e00 r5:85894800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf75fb0 to 0xecf75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8581ff00 INFO: task kworker/1:490:6542 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: cc1dd000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:491:6544 blocked for more than 469 seconds. r4:85895400 r5:85895400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf81e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85895400 r7:00000000 r6:83018200 r5:00001000 r4:7f30f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b978c r4:858b9400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b978c r4:85856e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85895400 r8:85856eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85856e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856e80 r8:8027ed34 r7:ecf75e60 r6:85856f00 r5:85895400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf81fb0 to 0xecf81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85526100 INFO: task kworker/1:491:6544 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: cc1dd000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:492 state:D stack:0 pid:6546 tgid:6546 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85896000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf89e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:858b9b8c r4:85856f80 r10:61c88647 r9:85896000 r8:85856fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85856f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856f80 r8:8027ed34 r7:ecf81e60 r6:8548e000 r5:85896000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf89fb0 to 0xecf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85526300 INFO: task kworker/1:492:6546 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: cc673000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:493:6548 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:493 state:D stack:0 pid:6548 tgid:6548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf95d84 r8:00000002 r7:60000013 r6:ecf95d8c r5:85896c00 r4:85896c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85896c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf95e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85896c00 r7:00000000 r6:83018200 r5:00001000 r4:7f317000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ba78c r4:858ba400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858ba78c r4:8548e080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85896c00 r8:8548e0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8548e080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548e080 r8:8027ed34 r7:ecf89e60 r6:8548e100 r5:85896c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf95fb0 to 0xecf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85526180 INFO: task kworker/1:493:6548 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: ccbc8000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:6549 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:6549 tgid:6549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf51d84 r8:00000002 r7:60000013 r6:ecf51d8c r5:85260c00 r4:85260c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85260c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf51e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85260c00 r7:00000000 r6:83018200 r5:00001000 r4:7f313000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf9f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b9f8c r4:858b9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b9f8c r4:8548e180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85260c00 r8:8548e1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8548e180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548e180 r8:8027ed34 r7:ecf95e60 r6:8548e200 r5:85260c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf51fb0 to 0xecf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85526440 INFO: task kworker/1:494:6549 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: cd004000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:6552 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:6552 tgid:6552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecfb1d84 r8:00000002 r7:60000113 r6:ecfb1d8c r5:858ab000 r4:858ab000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858ab000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfb1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855265c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:858ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f315000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ba38c r4:858ba000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858ba38c r4:8548e280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ab000 r8:8548e2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8548e280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548e280 r8:8027ed34 r7:ecf95e60 r6:851b5b00 r5:858ab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfb1fb0 to 0xecfb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85526180 INFO: task kworker/1:495:6552 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: cd3e8000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r4:82ac11e4 r4:eaec9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:6554 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:6554 tgid:6554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf9dd84 r8:00000002 r7:60000113 r6:ecf9dd8c r5:85260000 r4:85260000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85260000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf9de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85260000 r7:00000000 r6:83018200 r5:00001000 r4:7f319000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bab8c r4:858ba800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858bab8c r4:8548e300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85260000 r8:8548e32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8548e300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548e300 r8:8027ed34 r7:ecf95e60 r6:8548e380 r5:85260000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf9dfb0 to 0xecf9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85526740 INFO: task kworker/1:496:6554 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: cd9fb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:6556 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:6556 tgid:6556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecfb9d84 r8:00000002 r7:60000013 r6:ecfb9d8c r5:85262400 r4:85262400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85262400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfb9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855269c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85262400 r7:00000000 r6:83018200 r5:00001000 r4:7f31b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfc3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858baf8c r4:858bac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858baf8c r4:8548e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85262400 r8:8548e42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8548e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548e400 r8:8027ed34 r7:ecf9de60 r6:8548e480 r5:85262400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfb9fb0 to 0xecfb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855268c0 INFO: task kworker/1:497:6556 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: cd9fb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:6558 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:6558 tgid:6558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecfc1d84 r8:00000002 r7:60000013 r6:ecfc1d8c r5:85263000 r4:85263000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85263000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfc1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526b40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85263000 r7:00000000 r6:83018200 r5:00001000 r4:7f31d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfc9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bb38c r4:858bb000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858bb38c r4:8548e500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85263000 r8:8548e52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8548e500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548e500 r8:8027ed34 r7:ecfb9e60 r6:8548e580 r5:85263000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfc1fb0 to 0xecfc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85526c80 INFO: task kworker/1:498:6558 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: cddb1000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:499:6560 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:499 state:D stack:0 pid:6560 tgid:6560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecfd5d84 r8:00000002 r7:60000013 r6:ecfd5d8c r5:85264800 r4:85264800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85264800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfd5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526e00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85264800 r7:00000000 r6:83018200 r5:00001000 r4:7f31f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfd7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bb78c r4:858bb400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858bb78c r4:8548e600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85264800 r8:8548e62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8548e600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548e600 r8:8027ed34 r7:ecfc1e60 r6:8548e680 r5:85264800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfd5fb0 to 0xecfd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85526a80 INFO: task kworker/1:499:6560 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: ce10d000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:500:6562 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:6562 tgid:6562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecfe1d84 r8:00000002 r7:60000013 r6:ecfe1d8c r5:85263c00 r4:85263c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85263c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfe1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:ecfdd000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85526c80 INFO: task kworker/1:500:6562 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: ce7e6000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:6564 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:6564 tgid:6564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecfe9d84 r8:00000002 r7:60000013 r6:ecfe9d8c r5:85266c00 r4:85266c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85266c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfe9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561f280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85266c00 r7:00000000 r6:83018200 r5:00001000 r4:7f323000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85266c00 r8:8548e82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:502:6566 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:502 state:D stack:0 pid:6566 tgid:6566 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:858ac800 r5:858ac800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecff5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561f400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:858ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f325000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecff1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c438c r4:858c4000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c438c r4:8548e880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ac800 r8:8548e8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8561f000 Call trace: r5:80070013 r4:80239bd0 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:858ad400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561f500 r7:ddde2d40 r6:83018200 r5:858c478c r4:8548e900 Exception stack(0xecffdfb0 to 0xecffdff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:858ae000 r5:858ae000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561f800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:858ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f32b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed017000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c4f8c r4:858c4c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c4f8c r4:8548e980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ae000 r8:8548e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8548e980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548e980 r8:8027ed34 r7:ecffde60 r6:851b5d00 r5:858ae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed009fb0 to 0xed009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8561f0c0 INFO: task kworker/1:504:6570 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: cf2da000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/1:505:6572 blocked for more than 469 seconds. r5:858aec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561f5c0 r7:ddde2d40 r6:83018200 r5:858c4b8c r4:8548ea00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:eaec9dc0 r5:00001000 r4:ecc4f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:506:6575 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:6575 tgid:6575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed02dd84 r8:00000002 r7:60000113 r6:ed02dd8c r5:858aa400 r4:858aa400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858aa400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed02de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561f900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:858aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f32d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed01d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c538c r4:858c5000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c538c r4:8548ea80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858aa400 r8:8548eaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8548ea80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548ea80 r8:8027ed34 r7:ed009e60 r6:851b5e00 r5:858aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed02dfb0 to 0xed02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8561f7c0 INFO: task kworker/1:506:6575 is blocked on a mutex likely owned by task kworker/0:416:4498. [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaec9dc0 r5:00001000 r4:ecc4f000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84838000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84838000 r8:8548eb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561f7c0 Call trace: 9d60: 80070013 ffffffff r4:eaec9dc0 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:508:6577 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:508 state:D stack:0 pid:6577 tgid:6577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed03dd84 r8:00000002 r7:60000113 r6:ed03dd8c r5:858a9800 r4:858a9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858a9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed03de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561f880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:858a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f32f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed033000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c578c r4:858c5400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c578c r4:8548eb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a9800 r8:8548ebac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8548eb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548eb80 r8:8027ed34 r7:ed031e60 r6:851b5f00 r5:858a9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed03dfb0 to 0xed03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8561fb80 INFO: task kworker/1:508:6577 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:00000000 r5:85a50b8c r4:85a50800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:509:6579 blocked for more than 469 seconds. r5:85265400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:85265400 r7:00000000 r6:83018200 r5:00001000 r4:7f333000 r10:61c88647 r9:85265400 r8:8548ec2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561f7c0 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:510:6584 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:510 state:D stack:0 pid:6584 tgid:6584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed061d84 r8:00000002 r7:60000013 r6:ed061d8c r5:85266000 r4:85266000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85266000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed061e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561fe40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85266000 r7:00000000 r6:83018200 r5:00001000 r4:7f337000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed057000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5f8c r4:858c5c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c5f8c r4:8548ed00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85266000 r8:8548ed2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8548ed00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548ed00 r8:8027ed34 r7:ed031e60 r6:8548ed80 r5:85266000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed061fb0 to 0xed061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8561fd00 INFO: task kworker/1:510:6584 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) Not tainted 6.15.0-syzkaller #0 r5:85261800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:858c678c r4:858c6400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:512:6588 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:512 state:D stack:0 pid:6588 tgid:6588 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed041d84 r8:00000002 r7:60000013 r6:ed041d8c r5:84a50000 r4:84a50000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a50000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed041e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553a000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a50000 r7:00000000 r6:83018200 r5:00001000 r4:7f33d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed06d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c6b8c r4:858c6800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8548ef00 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/1:513:6590 blocked for more than 469 seconds. r5:84a51800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed075fb0 to 0xed075ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a50b8c r4:85a50800 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:514:6591 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:514 state:D stack:0 pid:6591 tgid:6591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed081d84 r8:00000002 r7:60000113 r6:ed081d8c r5:84a52400 r4:84a52400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a52400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed081e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553a340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a52400 r7:00000000 r6:83018200 r5:00001000 r4:7f33f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed077000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c6f8c r4:858c6c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c6f8c r4:85480100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a52400 r8:8548012c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85480100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85480100 r8:8027ed34 r7:ed075e60 r6:85480180 r5:84a52400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed081fb0 to 0xed081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8553a480 INFO: task kworker/1:514:6591 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d1232000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:858c778c r4:858c7400 r4:85480200 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/1:516:6596 blocked for more than 469 seconds. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed099e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553a7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a53c00 r7:00000000 r6:83018200 r5:00001000 r4:7f345000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed095000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c7b8c r4:858c7800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c7b8c r4:85480300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a53c00 r8:8548032c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85480300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85480300 r8:8027ed34 r7:ed011e60 r6:85480380 r5:84a53c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed099fb0 to 0xed099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8553a600 INFO: task kworker/1:516:6596 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d1e84000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed085fb0 to 0xed085ff8) Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:518 state:D stack:0 pid:6601 tgid:6601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed0a1d84 r8:00000002 r7:60000013 r6:ed0a1d8c r5:84a55400 r4:84a55400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a55400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553aac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a55400 r7:00000000 r6:83018200 r5:00001000 r4:7f349000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c838c r4:858c8000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c838c r4:85480500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a55400 r8:8548052c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85480500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85480500 r8:8027ed34 r7:ed085e60 r6:85480580 r5:84a55400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0a1fb0 to 0xed0a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8553a980 INFO: task kworker/1:518:6601 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d2550000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:ed0add84 r8:00000002 r7:60000113 r6:ed0add8c r5:84a56000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed0adfb0 to 0xed0adff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:520:6604 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:520 state:D stack:0 pid:6604 tgid:6604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed0b5d84 r8:00000002 r7:60000113 r6:ed0b5d8c r5:84a56c00 r4:84a56c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a56c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0b5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553af40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a56c00 r7:00000000 r6:83018200 r5:00001000 r4:7f34f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0cb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c8f8c r4:858c8c00 r7:ddde2d40 r6:83018200 r5:858c8f8c r4:85480700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851e4ec0 task:kworker/1:521 state:D stack:0 pid:6606 tgid:6606 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553ad40 r5:858c8b8c r4:858c8800 r4:85480800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:522:6609 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:522 state:D stack:0 pid:6609 tgid:6609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed0d5d84 r8:00000002 r7:60000113 r6:ed0d5d8c r5:857e0000 r4:857e0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857e0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0d5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f355000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0e5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c9b8c r4:858c9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c9b8c r4:85480900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e0000 r8:8548092c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85480900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85480900 r8:8027ed34 r7:ed0b5e60 r6:85480980 r5:857e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0d5fb0 to 0xed0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:523:6610 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:523 state:D stack:0 pid:6610 tgid:6610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed0c9d84 r8:00000002 r7:60000013 r6:ed0c9d8c r5:857e0c00 r4:857e0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857e0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0c9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f351000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c938c r4:858c9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85480a00 r8:8027ed34 r7:ed0d5e60 r6:85480a80 r5:857e0c00 Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:857e2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0e9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f353000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c978c r4:858c9400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c978c r4:85480b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e2400 r8:85480b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85480b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85480b00 r8:8027ed34 r7:ed0d5e60 r6:85480b80 r5:857e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0e9fb0 to 0xed0e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a4240 INFO: task kworker/1:524:6613 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d35ca000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:858c9f8c r4:858c9c00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d3c9a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:851e4ec0 task:kworker/1:526 state:D stack:0 pid:6617 tgid:6617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed0ddd84 r8:00000002 r7:60000113 r6:ed0ddd8c r5:857e3000 r4:857e3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857e3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0dde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f359000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0f9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ca38c r4:858ca000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858ca38c r4:85480c80 r4:85480c80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d3c9a000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed0fdfb0 to 0xed0fdff8) Workqueue: events bpf_prog_free_deferred 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:84879d00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f35b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed107000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ca78c r4:858ca400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858ca78c r4:85480d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e4800 r8:85480dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85480d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85480d80 r8:8027ed34 r7:ed0fde60 r6:85480f00 r5:857e4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed105fb0 to 0xed105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a4700 INFO: task kworker/1:528:6620 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d4106000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/1:529:6623 blocked for more than 470 seconds. r5:857e6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a4800 INFO: task kworker/1:529:6623 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d4571000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 Exception stack(0xeaec9fb0 to 0xeaec9ff8) Not tainted 6.15.0-syzkaller #0 r5:857e6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b4040 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: d4a70000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:858cb38c r4:858cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed129fb0 to 0xed129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a4ac0 INFO: task kworker/1:531:6625 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d4ed3000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:532:6628 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:532 state:D stack:0 pid:6628 tgid:6628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:859e0000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:858cbb8c r4:858cb800 r4:859af280 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:859af380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859af380 r8:8027ed34 r7:ed13de60 r6:859af400 r5:859e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec1fb0 to 0xecec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859b44c0 INFO: task kworker/1:533:6632 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d55ba000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:847faf8c r4:847fac00 r4:859af480 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1fde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f3080 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f3f9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfc5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d838c r4:858d8000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858d838c r4:859af580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e1800 r8:859af5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859af580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859af580 r8:8027ed34 r7:ecec1e60 r6:859af600 r5:859e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1fdfb0 to 0xed1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85852f00 INFO: task kworker/1:535:6789 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d60e1000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859e6000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:858d878c r4:859af680 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: d62b1000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:6794 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:6794 tgid:6794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed235d84 r8:00000002 r7:60000113 r6:ed235d8c r5:859e0c00 r4:859e0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859e0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed235e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f38c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f405000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed065000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d9b8c r4:858d9800 r10:61c88647 r9:859e0c00 r8:859af7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a50b8c r4:85a50800 r4:84879d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f33c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f3ff000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed01b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d8f8c r4:858d8c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858d8f8c r4:859af880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e4800 r8:859af8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859af880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859af880 r8:8027ed34 r7:ed235e60 r6:859af900 r5:859e4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed239fb0 to 0xed239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f3400 INFO: task kworker/1:538:6796 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d6522000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f35c0 r7:ddde2d40 r6:83018200 r5:858d938c r4:859af980 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) Not tainted 6.15.0-syzkaller #0 r5:8528b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:541:6802 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:541 state:D stack:0 pid:6802 tgid:6802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed255d84 r8:00000002 r7:60000013 r6:ed255d8c r5:85289800 r4:85289800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85289800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed255e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f3bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85289800 r7:00000000 r6:83018200 r5:00001000 r4:7f409000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed091000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858da38c r4:858da000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858da38c r4:859afb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85289800 r8:859afb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859afb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859afb00 r8:8027ed34 r7:ed235e60 r6:859a6000 r5:85289800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed255fb0 to 0xed255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a50b8c r4:85a50800 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeaec9fb0 to 0xeaec9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:542:6803 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:542 state:D stack:0 pid:6803 tgid:6803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed259d84 r8:00000002 r7:60000013 r6:ed259d8c r5:85288000 r4:85288000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85288000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed259e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f39c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85288000 r7:00000000 r6:83018200 r5:00001000 r4:7f407000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed071000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d9f8c r4:858d9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858d9f8c r4:859afb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85288000 r8:859afbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859afb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859afb80 r8:8027ed34 r7:ed255e60 r6:859a6080 r5:85288000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed259fb0 to 0xed259ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f3840 INFO: task kworker/1:542:6803 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d6bd3000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:6806 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:6806 tgid:6806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed261d84 r8:00000002 r7:60000113 r6:ed261d8c r5:8528c800 r4:8528c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8528c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed261e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f3e40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8528c800 r7:00000000 r6:83018200 r5:00001000 r4:7f40d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0bb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858dab8c r4:858da800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858dab8c r4:859afc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528c800 r8:859afc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859afc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859afc00 r8:8027ed34 r7:ed255e60 r6:859a6100 r5:8528c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed261fb0 to 0xed261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f3e00 INFO: task kworker/1:543:6806 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d712f000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:6807 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:6807 tgid:6807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed265d84 r8:00000002 r7:60000013 r6:ed265d8c r5:8528d400 r4:8528d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8528d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed265e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f3cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8528d400 r7:00000000 r6:83018200 r5:00001000 r4:7f40b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0a5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858da78c r4:858da400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858da78c r4:859afc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528d400 r8:859afcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859afc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859afc80 r8:8027ed34 r7:ed261e60 r6:859a6180 r5:8528d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed265fb0 to 0xed265ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f3e00 INFO: task kworker/1:544:6807 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d712f000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:545:6809 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:6809 tgid:6809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:8528e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8528e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed26de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a1300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8528e000 r7:00000000 r6:83018200 r5:00001000 r4:7f415000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed115000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858dbb8c r4:858db800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858dbb8c r4:859afd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528e000 r8:859afdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859afd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859afd80 r8:8027ed34 r7:ed261e60 r6:859a6200 r5:8528e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed26dfb0 to 0xed26dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f3c40 INFO: task kworker/1:545:6809 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d7419000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:546:6811 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:6811 tgid:6811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed275d84 r8:00000002 r7:60000113 r6:ed275d8c r5:8528bc00 r4:8528bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8528bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed275e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f3b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8528bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f40f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0cf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858daf8c r4:858dac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858daf8c r4:859afd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528bc00 r8:859afd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859afd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859afd00 r8:8027ed34 r7:ed26de60 r6:859a6280 r5:8528bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed275fb0 to 0xed275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481e000 INFO: task kworker/1:546:6811 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d795d000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:6813 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:547 state:D stack:0 pid:6813 tgid:6813 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed27dd84 r8:00000002 r7:60000113 r6:ed27dd8c r5:85288c00 r4:85288c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85288c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed27de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a1040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85288c00 r7:00000000 r6:83018200 r5:00001000 r4:7f411000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0eb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858db38c r4:858db000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858db38c r4:859afe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85288c00 r8:859afe2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859afe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859afe00 r8:8027ed34 r7:ed26de60 r6:859a6300 r5:85288c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed27dfb0 to 0xed27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f3840 INFO: task kworker/1:547:6813 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d8139000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:548:6815 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:548 state:D stack:0 pid:6815 tgid:6815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed251d84 r8:00000002 r7:60000113 r6:ed251d8c r5:859e6c00 r4:859e6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859e6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed251e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a1140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f413000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0ff000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858db78c r4:858db400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858db78c r4:859afe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e6c00 r8:859afeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859afe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859afe80 r8:8027ed34 r7:ed26de60 r6:859aff00 r5:859e6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed251fb0 to 0xed251ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a11c0 INFO: task kworker/1:548:6815 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d8139000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:851e4ec0 task:kworker/1:549 state:D stack:0 pid:6818 tgid:6818 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a13c0 r5:858dbf8c r4:858dbc00 r10:00000000 r9:859aff80 r8:8027ed34 r7:ed26de60 r6:85810000 r5:859e3c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a12c0 INFO: task kworker/1:549:6818 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d861d000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:ed285d84 r8:00000002 r7:60000013 r6:ed285d8c r5:857e5400 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed285e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r9:83018205 r8:857e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f419000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85810080 r8:8027ed34 r7:ed281e60 r6:85810100 r5:857e5400 Exception stack(0xed285fb0 to 0xed285ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:82ac11e4 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85a50b8c r4:85a50800 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) Not tainted 6.15.0-syzkaller #0 r4:859f0000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed289e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a17c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f41d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed171000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e0b8c r4:858e0800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e0b8c r4:85810180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f0000 r8:858101ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810180 r8:8027ed34 r7:ed285e60 r6:85810200 r5:859f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed289fb0 to 0xed289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a1680 INFO: task kworker/1:551:6823 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d89ee000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:552:6824 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:552 state:D stack:0 pid:6824 tgid:6824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed209d84 r8:00000002 r7:60000013 r6:ed209d8c r5:859f0c00 r4:859f0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed209e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a1700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f41b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed163000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e078c r4:858e0400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e078c r4:85810280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f0c00 r8:858102ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810280 r8:8027ed34 r7:ed289e60 r6:85810300 r5:859f0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed209fb0 to 0xed209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a1680 INFO: task kworker/1:552:6824 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d89ee000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:553:6826 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:553 state:D stack:0 pid:6826 tgid:6826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed291d84 r8:00000002 r7:60000013 r6:ed291d8c r5:859f2400 r4:859f2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed291e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a1940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f41f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed181000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e0f8c r4:858e0c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e0f8c r4:85810380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f2400 r8:858103ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810380 r8:8027ed34 r7:ed289e60 r6:85810400 r5:859f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed291fb0 to 0xed291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a1800 INFO: task kworker/1:553:6826 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d944b000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:554:6828 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:554 state:D stack:0 pid:6828 tgid:6828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed299d84 r8:00000002 r7:60000113 r6:ed299d8c r5:859f3000 r4:859f3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed299e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a1c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f421000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed19d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e138c r4:858e1000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e138c r4:85810480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f3000 r8:858104ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810480 r8:8027ed34 r7:ed291e60 r6:85810500 r5:859f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed299fb0 to 0xed299ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a18c0 INFO: task kworker/1:554:6828 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d944b000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:6830 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:555 state:D stack:0 pid:6830 tgid:6830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed295d84 r8:00000002 r7:60000013 r6:ed295d8c r5:859f1800 r4:859f1800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed295e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a1dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f423000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e178c r4:858e1400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e178c r4:85810580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f1800 r8:858105ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810580 r8:8027ed34 r7:ed299e60 r6:85810600 r5:859f1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed295fb0 to 0xed295ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a1b40 INFO: task kworker/1:555:6830 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d996e000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:556:6832 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:556 state:D stack:0 pid:6832 tgid:6832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2a1d84 r8:00000002 r7:60000013 r6:ed2a1d8c r5:859f5400 r4:859f5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596aa00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f427000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2a3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e1b8c r4:858e1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e1b8c r4:85810680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f5400 r8:858106ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810680 r8:8027ed34 r7:ed295e60 r6:85810700 r5:859f5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2a1fb0 to 0xed2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a1d00 INFO: task kworker/1:556:6832 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d996e000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:6835 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:6835 tgid:6835 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed29dd84 r8:00000002 r7:60000113 r6:ed29dd8c r5:859f3c00 r4:859f3c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed29de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a21c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f42d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2bd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e278c r4:858e2400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e278c r4:85810780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f3c00 r8:858107ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810780 r8:8027ed34 r7:ed2a1e60 r6:85810800 r5:859f3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed29dfb0 to 0xed29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596ad00 INFO: task kworker/1:557:6835 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d9dea000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:6837 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:6837 tgid:6837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2add84 r8:00000002 r7:60000013 r6:ed2add8c r5:859f6000 r4:859f6000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2ade08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481e240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f429000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e1f8c r4:858e1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e1f8c r4:85810880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f6000 r8:858108ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810880 r8:8027ed34 r7:ed29de60 r6:85810900 r5:859f6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2adfb0 to 0xed2adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a2100 INFO: task kworker/1:558:6837 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: d9dea000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:559:6839 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:559 state:D stack:0 pid:6839 tgid:6839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2c1d84 r8:00000002 r7:60000013 r6:ed2c1d8c r5:859f6c00 r4:859f6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a2000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f42b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2b7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e238c r4:858e2000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e238c r4:85810980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f6c00 r8:858109ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810980 r8:8027ed34 r7:ed29de60 r6:85810a00 r5:859f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2c1fb0 to 0xed2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a2300 INFO: task kworker/1:559:6839 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: da658000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:6842 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:6842 tgid:6842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2c9d84 r8:00000002 r7:60000013 r6:ed2c9d8c r5:859f4800 r4:859f4800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a25c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f433000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e338c r4:858e3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e338c r4:85810a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f4800 r8:85810aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810a80 r8:8027ed34 r7:ed29de60 r6:85810b00 r5:859f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2c9fb0 to 0xed2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a2180 INFO: task kworker/1:560:6842 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: da658000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:6844 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:6844 tgid:6844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2d5d84 r8:00000002 r7:60000113 r6:ed2d5d8c r5:859e8000 r4:859e8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859e8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2d5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a2380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f42f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2cb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e2b8c r4:858e2800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e2b8c r4:85810b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e8000 r8:85810bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810b80 r8:8027ed34 r7:ed2c9e60 r6:85810c00 r5:859e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2d5fb0 to 0xed2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a2340 INFO: task kworker/1:561:6844 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: da658000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:562:6845 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:562 state:D stack:0 pid:6845 tgid:6845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2ddd84 r8:00000002 r7:60000013 r6:ed2ddd8c r5:859f8c00 r4:859f8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2dde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a2500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f431000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e2f8c r4:858e2c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e2f8c r4:85810c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f8c00 r8:85810cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810c80 r8:8027ed34 r7:ed2c9e60 r6:85810d00 r5:859f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2ddfb0 to 0xed2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a2600 INFO: task kworker/1:562:6845 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: da658000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:563:6847 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:563 state:D stack:0 pid:6847 tgid:6847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2e9d84 r8:00000002 r7:60000113 r6:ed2e9d8c r5:859f9800 r4:859f9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2e9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a2ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e378c r4:858e3400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e378c r4:85810d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f9800 r8:85810dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810d80 r8:8027ed34 r7:ed2c9e60 r6:85810e00 r5:859f9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2e9fb0 to 0xed2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a2600 INFO: task kworker/1:563:6847 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: dac6f000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:564:6857 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:564 state:D stack:0 pid:6857 tgid:6857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed321d84 r8:00000002 r7:60000113 r6:ed321d8c r5:859fb000 r4:859fb000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed321e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a2740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f449000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed34f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e3b8c r4:858e3800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e3b8c r4:85810e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fb000 r8:85810eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810e80 r8:8027ed34 r7:ed2e9e60 r6:85810f00 r5:859fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed321fb0 to 0xed321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a2fc0 INFO: task kworker/1:564:6857 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: dac6f000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:565:6866 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:565 state:D stack:0 pid:6866 tgid:6866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed329d84 r8:00000002 r7:60000013 r6:ed329d8c r5:859fa400 r4:859fa400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fa400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed329e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858505c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f3ed000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa67000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e3f8c r4:858e3c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858e3f8c r4:85810f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fa400 r8:85810fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85810f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85810f80 r8:8027ed34 r7:ed321e60 r6:85811000 r5:859fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed329fb0 to 0xed329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859a2940 INFO: task kworker/1:565:6866 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: db121000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:566:6916 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:566 state:D stack:0 pid:6916 tgid:6916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed215d84 r8:00000002 r7:60000113 r6:ed215d8c r5:859fc800 r4:859fc800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fc800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed215e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858507c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f3ef000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccfd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fdf8c r4:847fdc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fdf8c r4:85811080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fc800 r8:858110ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811080 r8:8027ed34 r7:ed329e60 r6:85811100 r5:859fc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed215fb0 to 0xed215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85850580 INFO: task kworker/1:566:6916 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: db121000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:567:6919 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:567 state:D stack:0 pid:6919 tgid:6919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed219d84 r8:00000002 r7:60000013 r6:ed219d8c r5:859fd400 r4:859fd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed219e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85850a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f3f3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfb3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c038c r4:859c0000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c038c r4:85811180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fd400 r8:858111ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811180 r8:8027ed34 r7:ed215e60 r6:85811200 r5:859fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed219fb0 to 0xed219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85850680 INFO: task kworker/1:567:6919 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: db6ce000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:568:6922 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:568 state:D stack:0 pid:6922 tgid:6922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed221d84 r8:00000002 r7:60000113 r6:ed221d8c r5:859fec00 r4:859fec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed221e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85850c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f3f5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfd1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c078c r4:859c0400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c078c r4:85811280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fec00 r8:858112ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811280 r8:8027ed34 r7:ed219e60 r6:85811300 r5:859fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed221fb0 to 0xed221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85850740 INFO: task kworker/1:568:6922 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: dba23000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:569:6924 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:569 state:D stack:0 pid:6924 tgid:6924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed225d84 r8:00000002 r7:60000113 r6:ed225d8c r5:859f8000 r4:859f8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed225e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85850f40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f3f9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed035000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c0b8c r4:859c0800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c0b8c r4:85811380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f8000 r8:858113ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811380 r8:8027ed34 r7:ed221e60 r6:85811400 r5:859f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed225fb0 to 0xed225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85850c40 INFO: task kworker/1:569:6924 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: dbdec000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:6927 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:6927 tgid:6927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed229d84 r8:00000002 r7:60000013 r6:ed229d8c r5:859fe000 r4:859fe000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fe000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed229e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85850dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f3fb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed059000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c0f8c r4:859c0c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c0f8c r4:85811480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fe000 r8:858114ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811480 r8:8027ed34 r7:ed225e60 r6:85811500 r5:859fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed229fb0 to 0xed229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85850f00 INFO: task kworker/1:570:6927 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: dbdec000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:851e4ec0 task:kworker/1:571 state:D stack:0 pid:6929 tgid:6929 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:859fbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:859fbc00 r8:858115ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:00001000 r4:ecc4f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:572:6931 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:572 state:D stack:0 pid:6931 tgid:6931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed22dd84 r8:00000002 r7:60000013 r6:ed22dd8c r5:859e9800 r4:859e9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859e9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed22de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f7040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f3fd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed06f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c138c r4:859c1000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c138c r4:85811680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e9800 r8:858116ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811680 r8:8027ed34 r7:ed2b5e60 r6:85811700 r5:859e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed22dfb0 to 0xed22dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858f7180 INFO: task kworker/1:572:6931 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: dc582000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:573:6933 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:6933 tgid:6933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2f1d84 r8:00000002 r7:60000113 r6:ed2f1d8c r5:859ea400 r4:859ea400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859ea400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f7400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f401000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0b1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c1b8c r4:859c1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c1b8c r4:85811780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859ea400 r8:858117ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811780 r8:8027ed34 r7:ed2b5e60 r6:85811800 r5:859ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2f1fb0 to 0xed2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858f7140 INFO: task kworker/1:573:6933 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: dcaed000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:852e0c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed515e08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c238c r4:859c2000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c238c r4:85811880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e0c00 r8:858118ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811880 r8:8027ed34 r7:ed2f1e60 r6:859a6400 r5:852e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed515fb0 to 0xed515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858f7440 INFO: task kworker/1:574:6935 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: dcaed000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:575:6937 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:575 state:D stack:0 pid:6937 tgid:6937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed51dd84 r8:00000002 r7:60000013 r6:ed51dd8c r5:852e5400 r4:852e5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed51de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f7540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f403000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0d9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c1f8c r4:859c1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c1f8c r4:85811900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e5400 r8:8581192c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811900 r8:8027ed34 r7:ed515e60 r6:859a6480 r5:852e5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed51dfb0 to 0xed51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858f7580 INFO: task kworker/1:575:6937 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: dcaed000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:576:6938 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:576 state:D stack:0 pid:6938 tgid:6938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:852e6000 r5:852e6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f7940 r7:ddde2d40 r6:83018200 r5:859c278c r4:85811980 Exception stack(0xed521fb0 to 0xed521ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:00001000 r4:ecc4f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:577 state:D stack:0 pid:6941 tgid:6941 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852e6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed245e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f7a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f40b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed169000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c2b8c r4:859c2800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c2b8c r4:85811a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e6c00 r8:85811a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811a00 r8:8027ed34 r7:ed521e60 r6:859a6580 r5:852e6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed245fb0 to 0xed245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858f7900 INFO: task kworker/1:577:6941 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: dd1e4000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:578:6944 blocked for more than 471 seconds. [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:852e3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:852e3c00 r8:85811aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811a80 r8:8027ed34 r7:ed245e60 r6:859a6600 r5:852e3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed529fb0 to 0xed529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858f79c0 INFO: task kworker/1:578:6944 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: dd1e4000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:579:6946 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:579 state:D stack:0 pid:6946 tgid:6946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed531d84 r8:00000002 r7:60000013 r6:ed531d8c r5:852e2400 r4:852e2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed531e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f7b40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f40d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed17f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c2f8c r4:859c2c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c2f8c r4:85811b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e2400 r8:85811b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811b00 r8:8027ed34 r7:ed529e60 r6:859a6680 r5:852e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed531fb0 to 0xed531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858f7ac0 INFO: task kworker/1:579:6946 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: dd58b000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:580:6948 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:580 state:D stack:0 pid:6948 tgid:6948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed539d84 r8:00000002 r7:60000013 r6:ed539d8c r5:852e4800 r4:852e4800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed539e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f7c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f40f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed19f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c338c r4:859c3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c338c r4:85811b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e4800 r8:85811bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811b80 r8:8027ed34 r7:ed529e60 r6:859a6700 r5:852e4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed539fb0 to 0xed539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858f7ac0 INFO: task kworker/1:580:6948 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: dd933000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:581 state:D stack:0 pid:6949 tgid:6949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed53dd84 r8:00000002 r7:60000013 r6:ed53dd8c r5:852e0000 r4:852e0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed53de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f7e00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f411000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:8528ec00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed23b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c3b8c r4:859c3800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c3b8c r4:85811c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528ec00 r8:85811cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811c80 r8:8027ed34 r7:ed529e60 r6:859a6800 r5:8528ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed545fb0 to 0xed545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858f7d40 INFO: task kworker/1:582:6951 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: ddefa000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:852e1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed54de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481eac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f415000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed249000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c3f8c r4:859c3c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c3f8c r4:85811d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e1800 r8:85811d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:858f7f00 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:00001000 r4:ecc4f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:584 state:D stack:0 pid:6955 tgid:6955 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858abc00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed555e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85823800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:858abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f417000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed267000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c438c r4:859c4000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c438c r4:85811d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858abc00 r8:85811dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811d80 r8:8027ed34 r7:ed529e60 r6:859a6900 r5:858abc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:eaec9dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:585:6957 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:585 state:D stack:0 pid:6957 tgid:6957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed55dd84 r8:00000002 r7:60000113 r6:ed55dd8c r5:859b8c00 r4:859b8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed55de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0fc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f419000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed271000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:859c478c r4:85811e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r4:eaec9dc0 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:859b8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85811e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: de26c000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:587:6961 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:587 state:D stack:0 pid:6961 tgid:6961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed56dd84 r8:00000002 r7:60000113 r6:ed56dd8c r5:859b9800 r4:859b9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed56de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85836080 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f41d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2a7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:859c4f8c r4:859c4c00 r10:00000000 r9:85811f00 r8:8027ed34 r7:ed529e60 r6:859a6a80 r5:859b9800 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ed575d84 r8:00000002 r7:60000013 r6:ed575d8c r5:859ba400 r5:859ba400 r4:829187f0 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85836280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f41f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2b9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c538c r4:859c5000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c538c r4:85811f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859ba400 r8:85811fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85811f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811f80 r8:8027ed34 r7:ed529e60 r6:859a6b00 r5:859ba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed575fb0 to 0xed575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85836400 INFO: task kworker/1:588:6963 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: def55000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r5:00001000 r4:ecc4f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84879d00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:ed57dd84 r8:00000002 r7:60000113 r6:ed57dd8c r5:859bb000 r5:859bb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed57de08 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:590:6967 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:590 state:D stack:0 pid:6967 tgid:6967 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed585d84 r8:00000002 r7:60000113 r6:ed585d8c r5:859bbc00 r4:859bbc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859bbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed585e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85836540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f423000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2e1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c5b8c r4:859c5800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c5b8c r4:85806080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859bbc00 r8:858060ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85806080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806080 r8:8027ed34 r7:ed57de60 r6:859a6c00 r5:859bbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed585fb0 to 0xed585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85836680 INFO: task kworker/1:590:6967 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:859bc800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xed58dfb0 to 0xed58dff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: df7fd000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:592:6971 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:592 state:D stack:0 pid:6971 tgid:6971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed595d84 r8:00000002 r7:60000013 r6:ed595d8c r5:859bec00 r4:859bec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859bec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:592:6971 is blocked on a mutex likely owned by task kworker/0:416:4498. r5:80070013 r4:80239bd0 r4:eaec9dc0 r5:00001000 r4:ecc4f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:859be000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c6b8c r4:859c6800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c6b8c r4:85806200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859be000 r8:8580622c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85806200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806200 r8:8027ed34 r7:ed595e60 r6:859a6d80 r5:859be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5adfb0 to 0xed5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85836900 INFO: task kworker/1:593:6974 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e04cb000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:594:6976 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:594 state:D stack:0 pid:6976 tgid:6976 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855d8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5c1e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:594:6976 is blocked on a mutex likely owned by task kworker/0:416:4498. [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:85a50b8c r4:85a50800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:595:6978 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:595 state:D stack:0 pid:6978 tgid:6978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed5c9d84 r8:00000002 r7:60000113 r6:ed5c9d8c r5:855d9800 r4:855d9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855d9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5c9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85836b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f42f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5b5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c6f8c r4:859c6c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c6f8c r4:85806300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d9800 r8:8580632c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85806300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806300 r8:8027ed34 r7:ed5c1e60 r6:859a6e80 r5:855d9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5c9fb0 to 0xed5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858369c0 INFO: task kworker/1:595:6978 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:596:6980 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:596 state:D stack:0 pid:6980 tgid:6980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:855db000 r5:855db000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85806380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 r4:eaec9dc0 r4:00000000 r5:00001000 r4:ecc4f000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:597 state:D stack:0 pid:6981 tgid:6981 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855d8c00 r4:829187f0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:855d8c00 r8:8580642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806400 r8:8027ed34 r7:ed5d9e60 r6:859a6f80 r5:855d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5ddfb0 to 0xed5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85836b40 INFO: task kworker/1:597:6981 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e0d50000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:598:6984 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:598 state:D stack:0 pid:6984 tgid:6984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed5e9d84 r8:00000002 r7:60000013 r6:ed5e9d8c r5:855da400 r4:855da400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855da400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5e9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85850180 r7:ddde2d40 r6:83018200 r5:859c7b8c r4:85806480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851e4ec0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:859ebc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed519e08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:859c8f8c r4:859c8c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:599:6986 is blocked on a mutex likely owned by task kworker/0:416:4498. 9d60: 80070013 ffffffff r4:eaec9dc0 r5:00001000 r4:ecc4f000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851e4ec0 Workqueue: events bpf_prog_free_deferred r5:859ec800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8581e100 INFO: task kworker/1:600:6989 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e1776000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:601:6990 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:601 state:D stack:0 pid:6990 tgid:6990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2c5d84 r8:00000002 r7:60000013 r6:ed2c5d8c r5:859ed400 r4:859ed400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859ed400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:859c878c r4:859c8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/1:602:6992 blocked for more than 472 seconds. r5:859ee000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e1c77000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:603:6994 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:603 state:D stack:0 pid:6994 tgid:6994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed5f5d84 r8:00000002 r7:60000113 r6:ed5f5d8c r5:859eb000 r4:859eb000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859eb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5f5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581e780 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:eaec9dc0 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ed5fdd84 r8:00000002 r7:60000113 r6:ed5fdd8c r5:859e8c00 r5:859e8c00 r4:829187f0 r4:00000000 r9:83018205 r8:859e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4b5000 r10:61c88647 r9:859e8c00 r8:85806a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8581e6c0 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e20d4000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:6999 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:605 state:D stack:0 pid:6999 tgid:6999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed5f9d84 r8:00000002 r7:60000013 r6:ed5f9d8c r5:84a70000 r4:84a70000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a70000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5f9e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85806b00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 r4:00000000 r5:85a50b8c r4:85a50800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:851e4ec0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84a71800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:84a71800 r7:00000000 r6:83018200 r5:00001000 r4:7f4bb000 r7:ddde2d40 r6:83018200 r5:859ca38c r4:85806c00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e2682000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:607:7002 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:607 state:D stack:0 pid:7002 tgid:7002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed605d84 r8:00000002 r7:60000013 r6:ed605d8c r5:84a72400 r4:84a72400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a72400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed605e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581ec40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a72400 r7:00000000 r6:83018200 r5:00001000 r4:7f4b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed353000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859c9f8c r4:859c9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859c9f8c r4:85806d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a72400 r8:85806d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85806d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806d00 r8:8027ed34 r7:ed601e60 r6:85806d80 r5:84a72400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed605fb0 to 0xed605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8581eb80 INFO: task kworker/1:607:7002 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e2821000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84a73c00 r5:84a73c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85836ec0 r5:00001000 r4:ed36f000 r7:ddde2d40 r6:83018200 r5:859ca78c r4:85806e00 Exception stack(0xed60dfb0 to 0xed60dff8) r4:8581ef00 Call trace: 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:609:7007 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:609 state:D stack:0 pid:7007 tgid:7007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed611d84 r8:00000002 r7:60000113 r6:ed611d8c r5:84a73000 r4:84a73000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a73000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed611e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585d040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a73000 r7:00000000 r6:83018200 r5:00001000 r4:7f4c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed377000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859cab8c r4:859ca800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859cab8c r4:85806f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a73000 r8:85806f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85806f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85806f00 r8:8027ed34 r7:ed60de60 r6:85806f80 r5:84a73000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed611fb0 to 0xed611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8585d080 INFO: task kworker/1:609:7007 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e2d5e000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed609e08 r9:83018205 r8:84a74800 r7:00000000 r6:83018200 r5:00001000 r4:7f4c3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859caf8c r4:8595e000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a74800 r8:8595e02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8595e000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8595e000 r8:8027ed34 r7:ed611e60 r6:8595e080 r5:84a74800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed609fb0 to 0xed609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8585d080 INFO: task kworker/1:610:7009 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e30c7000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:611 state:D stack:0 pid:7012 tgid:7012 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a75400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed615e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585d380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a75400 r7:00000000 r6:83018200 r5:00001000 r4:7f4c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed389000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859cb38c r4:859cb000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859cb38c r4:8595e100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:8595e12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8595e100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8595e100 r8:8027ed34 r7:ed609e60 r6:8595e180 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed615fb0 to 0xed615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8585d240 INFO: task kworker/1:611:7012 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e31fe000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:612:7013 blocked for more than 472 seconds. r4:84a76000 r5:84a76000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585d680 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed619fb0 to 0xed619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8585d300 INFO: task kworker/1:612:7013 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e31fe000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:613:7016 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:613 state:D stack:0 pid:7016 tgid:7016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed61dd84 r8:00000002 r7:60000013 r6:ed61dd8c r5:84a76c00 r4:84a76c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a76c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed61de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585d500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed393000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859cb78c r4:859cb400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859cb78c r4:8595e300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a76c00 r8:8595e32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8595e300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8595e300 r8:8027ed34 r7:ed619e60 r6:8595e380 r5:84a76c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed61dfb0 to 0xed61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r5:85a50b8c r4:85a50800 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84a70c00 r5:84a70c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed621e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585d740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4cb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3b1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859cbf8c r4:859cbc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859cbf8c r4:8595e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a70c00 r8:8595e42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8595e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8595e400 r8:8027ed34 r7:ed619e60 r6:8595e480 r5:84a70c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed621fb0 to 0xed621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8585d5c0 INFO: task kworker/1:614:7018 is blocked on a mutex likely owned by task kworker/0:416:4498. Workqueue: events bpf_prog_free_deferred Exception stack(0xeaec9d20 to 0xeaec9d68) r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 Exception stack(0xeaec9fb0 to 0xeaec9ff8) Workqueue: events bpf_prog_free_deferred r5:85a00000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:8595e500 r8:8027ed34 r7:ed621e60 r6:8595e580 r5:85a00000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:616:7022 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:616 state:D stack:0 pid:7022 tgid:7022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed62dd84 r8:00000002 r7:60000113 r6:ed62dd8c r5:85a00c00 r4:85a00c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a00c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed62de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585db00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a00c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4cf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3cf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9478c r4:85a94400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a9478c r4:8595e600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a00c00 r8:8595e62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8595e600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xed62dfb0 to 0xed62dff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:617:7023 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:617 state:D stack:0 pid:7023 tgid:7023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed625d84 r8:00000002 r7:60000113 r6:ed625d8c r5:85a01800 r4:85a01800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a01800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed625e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585dcc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a01800 r7:00000000 r6:83018200 r5:00001000 r4:7f4d1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3db000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a94b8c r4:85a94800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a94b8c r4:8595e700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a01800 r8:8595e72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 Exception stack(0xed625fb0 to 0xed625ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:618 state:D stack:0 pid:7026 tgid:7026 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85a02400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed631e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8595e800 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:619:7027 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:619 state:D stack:0 pid:7027 tgid:7027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed635d84 r8:00000002 r7:60000113 r6:ed635d8c r5:85a03000 r4:85a03000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a03000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed635e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85967fc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a03000 r7:00000000 r6:83018200 r5:00001000 r4:7f4d5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3f9000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8595e900 r8:8027ed34 r7:ed631e60 r6:8595e980 r5:85a03000 r4:00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a03c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:85a03c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed40b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9578c r4:85a95400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a9578c r4:8595ea00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a03c00 r8:8595ea2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8595ea00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8595ea00 r8:8027ed34 r7:ed635e60 r6:8595ea80 r5:85a03c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed639fb0 to 0xed639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8585df80 INFO: task kworker/1:620:7029 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e479d000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:621:7031 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:621 state:D stack:0 pid:7031 tgid:7031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed63dd84 r8:00000002 r7:60000013 r6:ed63dd8c r5:85a04800 r4:85a04800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a04800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed63de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a32240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a04800 r7:00000000 r6:83018200 r5:00001000 r4:7f4d9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:622:7033 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:622 state:D stack:0 pid:7033 tgid:7033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed641d84 r8:00000002 r7:60000113 r6:ed641d8c r5:85a05400 r4:85a05400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a05400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed641e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a32500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a05400 r7:00000000 r6:83018200 r5:00001000 r4:7f4dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed435000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed641fb0 to 0xed641ff8) task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:eaec9dc0 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a50b8c r4:85a50800 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:85a06000 r4:00000000 r5:00001000 r4:ed429000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:624:7037 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:624 state:D stack:0 pid:7037 tgid:7037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed649d84 r8:00000002 r7:60000013 r6:ed649d8c r5:85a06c00 r4:85a06c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a06c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed649e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a326c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a06c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4df000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed447000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9678c r4:85a96400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a9678c r4:8595ee00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a06c00 r8:8595ee2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8595ee00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8595ee00 r8:8027ed34 r7:ed641e60 r6:8595ee80 r5:85a06c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed649fb0 to 0xed649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a32340 INFO: task kworker/1:624:7037 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e5041000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:625 state:D stack:0 pid:7040 tgid:7040 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:85a08c00 r8:8595ef2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:626:7041 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:626 state:D stack:0 pid:7041 tgid:7041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed655d84 r8:00000002 r7:60000113 r6:ed655d8c r5:85a09800 r4:85a09800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a09800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed655e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a32780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a09800 r7:00000000 r6:83018200 r5:00001000 r4:7f4e1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed453000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a50b8c r4:85a50800 r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:627:7043 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:627 state:D stack:0 pid:7043 tgid:7043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85a0a400 r4:00000000 r5:00001000 r4:ed465000 r4:85aa0100 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:82ac11e4 r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a32d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a0b000 r7:00000000 r6:83018200 r5:00001000 r4:7f4e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed483000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9778c r4:85a97400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a9778c r4:85aa0200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a0b000 r8:85aa022c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aa0200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0200 r8:8027ed34 r7:ed651e60 r6:85aa0280 r5:85a0b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed659fb0 to 0xed659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a32b40 INFO: task kworker/1:628:7045 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:629 state:D stack:0 pid:7048 tgid:7048 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85a0c800 r8:85aa032c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d20: e5c40000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:7049 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:7049 tgid:7049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:ed665d84 r8:00000002 r7:60000113 r6:ed665d8c r5:85a0d400 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a32e80 INFO: task kworker/1:630:7049 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e5fca000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 INFO: task kworker/1:631:7051 blocked for more than 472 seconds. r5:85a0ec00 r4:829187f0 r5:00001000 r4:ed4ad000 r4:85aa0500 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85a0e000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed66de08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85aa0600 r8:8027ed34 r7:ed669e60 r6:85aa0680 r5:85a0e000 r4:85aa71c0 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r4:85a10000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a10000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed675e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa7c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a10000 r7:00000000 r6:83018200 r5:00001000 r4:7f4f9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed507000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2138c r4:85a21000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2138c r4:85aa0700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a10000 r8:85aa072c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aa0700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0700 r8:8027ed34 r7:ed66de60 r6:85aa0780 r5:85a10000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed675fb0 to 0xed675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aa75c0 INFO: task kworker/1:633:7056 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e6771000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:eaec9dc0 r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ed4dd000 r10:61c88647 r9:85a10c00 r8:85aa082c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:635:7059 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:635 state:D stack:0 pid:7059 tgid:7059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed679d84 r8:00000002 r7:60000113 r6:ed679d8c r5:85a12400 r4:85a12400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a12400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed679e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa78c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a12400 r7:00000000 r6:83018200 r5:00001000 r4:7f4f5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4e9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a20f8c r4:85a20c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a20f8c r4:85aa0900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a12400 r8:85aa092c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aa0900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0900 r8:8027ed34 r7:ed675e60 r6:85aa0980 r5:85a12400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed679fb0 to 0xed679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aa7900 INFO: task kworker/1:635:7059 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d20: e6a41000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ed67f000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2178c r4:85a21400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2178c r4:85aa0a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a11800 r8:85aa0a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aa0a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0a00 r8:8027ed34 r7:ed675e60 r6:85aa0a80 r5:85a11800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed67dfb0 to 0xed67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aa7c40 INFO: task kworker/1:636:7063 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e6a41000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:637:7066 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:85a13c00 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a21b8c r4:85a21800 r10:61c88647 r9:85a13c00 r8:85aa0b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85aa0b00 r8:8027ed34 r7:ed67de60 r6:85aa0b80 r5:85a13c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aa7ec0 INFO: task kworker/1:637:7066 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e6dba000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:638:7067 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:638 state:D stack:0 pid:7067 tgid:7067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed689d84 r8:00000002 r7:60000113 r6:ed689d8c r5:85a14800 r4:85a14800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a14800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed689e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa31c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a14800 r7:00000000 r6:83018200 r5:00001000 r4:7f503000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6a3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2238c r4:85a22000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2238c r4:85aa0c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a14800 r8:85aa0c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aa0c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0c00 r8:8027ed34 r7:ed65de60 r6:85aa0c80 r5:85a14800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed689fb0 to 0xed689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aa7ec0 INFO: task kworker/1:638:7067 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e6dba000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:639:7070 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:639 state:D stack:0 pid:7070 tgid:7070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed69dd84 r8:00000002 r7:60000013 r6:ed69dd8c r5:85a16000 r4:85a16000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a16000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed69de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa3000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a16000 r7:00000000 r6:83018200 r5:00001000 r4:7f501000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed699000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a21f8c r4:85a21c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a21f8c r4:85aa0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a16000 r8:85aa0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aa0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0d00 r8:8027ed34 r7:ed689e60 r6:85aa0d80 r5:85a16000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed69dfb0 to 0xed69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aa3100 INFO: task kworker/1:639:7070 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e7491000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:640:7073 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:640 state:D stack:0 pid:7073 tgid:7073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed691d84 r8:00000002 r7:60000013 r6:ed691d8c r5:85a16c00 r4:85a16c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a16c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed691e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa3280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f505000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2278c r4:85a22400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2278c r4:85aa0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a16c00 r8:85aa0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aa0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0e00 r8:8027ed34 r7:ed689e60 r6:85aa0e80 r5:85a16c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed691fb0 to 0xed691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aa3180 INFO: task kworker/1:640:7073 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e7491000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:641:7074 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:641 state:D stack:0 pid:7074 tgid:7074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85a15400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6ade08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa3480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a15400 r7:00000000 r6:83018200 r5:00001000 r4:7f507000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6b7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a22b8c r4:85a22800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a22b8c r4:85aa0f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a15400 r8:85aa0f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aa0f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0f00 r8:8027ed34 r7:ed691e60 r6:85aa0f80 r5:85a15400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6adfb0 to 0xed6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aa3180 INFO: task kworker/1:641:7074 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e79e7000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:855dc800 r4:829187f0 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80070013 ffffffff r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a50b8c r4:85a50800 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:643:7079 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:643 state:D stack:0 pid:7079 tgid:7079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed5a1d84 r8:00000002 r7:60000113 r6:ed5a1d8c r5:855dec00 r4:855dec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855dec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa3700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc27000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2338c r4:85a23000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2338c r4:85aab080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855dec00 r8:85aab0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aab080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aab080 r8:8027ed34 r7:ed6c5e60 r6:85533080 r5:855dec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5a1fb0 to 0xed5a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aa3540 INFO: task kworker/1:643:7079 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e7ca5000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:644:7081 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:644 state:D stack:0 pid:7081 tgid:7081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed5a9d84 r8:00000002 r7:60000013 r6:ed5a9d8c r5:855de000 r4:855de000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855de000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5a9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:ecf8d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d20: e7e00000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:645:7082 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:ed5b9d84 r8:00000002 r7:60000013 r6:ed5b9d8c r5:855dbc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5b9e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ecfbb000 r5:85a23b8c r4:85a23800 r10:61c88647 r9:855dbc00 r8:85aab1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 Exception stack(0xed5b9fb0 to 0xed5b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 9d60: 80070013 ffffffff r4:eaec9dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:646 state:D stack:0 pid:7085 tgid:7085 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2c78c r4:85a2c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2c78c r4:85aab200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855dd400 r8:85aab22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aab200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aab200 r8:8027ed34 r7:ed5b9e60 r6:85533200 r5:855dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6d9fb0 to 0xed6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aa3900 INFO: task kworker/1:646:7085 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e84c8000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:647:7086 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:647 state:D stack:0 pid:7086 tgid:7086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed6ddd84 r8:00000002 r7:60000013 r6:ed6ddd8c r5:852e3000 r4:852e3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6dde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa3ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f3f3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a50b8c r4:85a50800 r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:648:7087 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:648 state:D stack:0 pid:7087 tgid:7087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed6b5d84 r8:00000002 r7:60000113 r6:ed6b5d8c r5:85a13000 r4:85a13000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a13000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6b5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa3c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a13000 r7:00000000 r6:83018200 r5:00001000 r4:7f3f5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed045000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2c38c r4:85a2c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2c38c r4:85aab300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a13000 r8:85aab32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aab300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aab300 r8:8027ed34 r7:ed6d9e60 r6:85aab380 r5:85a13000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6b5fb0 to 0xed6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aa3a40 INFO: task kworker/1:648:7087 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e8736000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:649:7090 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:649 state:D stack:0 pid:7090 tgid:7090 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:859eec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6d5e08 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85a2cf8c r4:85aab400 r4:85aab400 r4:00000001 Exception stack(0xed6d5fb0 to 0xed6d5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:82ac11e4 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:650:7091 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:650 state:D stack:0 pid:7091 tgid:7091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed6c1d84 r8:00000002 r7:60000113 r6:ed6c1d8c r5:85a0bc00 r4:85a0bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a0bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6c1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa7380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3fb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed09d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2cb8c r4:85a2c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2cb8c r4:85aab500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a0bc00 r8:85aab52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aab500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aab500 r8:8027ed34 r7:ed6d5e60 r6:85aab580 r5:85a0bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6c1fb0 to 0xed6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aa3d00 INFO: task kworker/1:650:7091 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e8aa1000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:651:7095 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:7095 tgid:7095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed6e5d84 r8:00000002 r7:60000113 r6:ed6e5d8c r5:85a08000 r4:85a08000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a08000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6e5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abf140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a08000 r7:00000000 r6:83018200 r5:00001000 r4:7f3ff000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed109000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2d38c r4:85a2d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2d38c r4:85aab600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a08000 r8:85aab62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aab600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aab600 r8:8027ed34 r7:ed6d5e60 r6:85aab680 r5:85a08000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6e5fb0 to 0xed6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85abf280 INFO: task kworker/1:651:7095 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85ad0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6ede08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abf340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ad0000 r7:00000000 r6:83018200 r5:00001000 r4:7f401000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed133000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2d78c r4:85a2d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2d78c r4:85aab700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ad0000 r8:85aab72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aab700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aab700 r8:8027ed34 r7:ed6e5e60 r6:85aab780 r5:85ad0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6edfb0 to 0xed6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85abf080 INFO: task kworker/1:652:7096 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e8e61000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:653:7098 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:653 state:D stack:0 pid:7098 tgid:7098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:85a40c00 r7:00000000 r6:83018200 r5:00001000 r4:7f403000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 r4:eaec9dc0 r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:654 state:D stack:0 pid:7100 tgid:7100 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6f9e08 r4:00000000 r5:00001000 r4:ed18b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2df8c r4:85a2dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2df8c r4:85aab880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a42400 r8:85aab8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aab880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aab880 r8:8027ed34 r7:ed6f5e60 r6:85533380 r5:85a42400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6f9fb0 to 0xed6f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85abf480 INFO: task kworker/1:654:7100 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e945f000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:655:7102 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:655 state:D stack:0 pid:7102 tgid:7102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed6fdd84 r8:00000002 r7:60000013 r6:ed6fdd8c r5:85a43000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6fde08 r9:83018205 r8:85a43000 r7:00000000 r6:83018200 r5:00001000 r4:7f409000 r4:85aab900 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: e945f000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r4:eaec9dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:656:7105 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:656 state:D stack:0 pid:7105 tgid:7105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed709d84 r8:00000002 r7:60000013 r6:ed709d8c r5:85a45400 r4:85a45400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a45400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed709e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abf880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a45400 r7:00000000 r6:83018200 r5:00001000 r4:7f40b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed247000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2e78c r4:85a2e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2e78c r4:85aab980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a45400 r8:85aab9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aab980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aab980 r8:8027ed34 r7:ed6fde60 r6:85533480 r5:85a45400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed709fb0 to 0xed709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85abf740 INFO: task kworker/1:656:7105 is blocked on a mutex likely owned by task kworker/0:416:4498. r4:00000000 9d60: 80070013 ffffffff r4:eaec9dc0 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a50b8c r4:85a50800 r4:84879d00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:657 state:D stack:0 pid:7107 tgid:7107 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed711e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abfac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a43c00 r7:00000000 r6:83018200 r5:00001000 r4:7f40f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed279000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2ef8c r4:85a2ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2ef8c r4:85aaba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a43c00 r8:85aaba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aaba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aaba00 r8:8027ed34 r7:ed709e60 r6:85533500 r5:85a43c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed711fb0 to 0xed711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85abf800 INFO: task kworker/1:657:7107 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaec9d20 to 0xeaec9d68) 9d20: e9955000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 9d40: 7f3d7000 eaeeb000 8280c9b4 eaec9d9c eaec9da0 eaec9d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeaec9fb0 to 0xeaec9ff8) INFO: task kworker/1:658:7108 blocked for more than 473 seconds. r10:829187f4 r9:ed6f1d84 r8:00000002 r7:60000113 r6:ed6f1d8c r5:85ad1800 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85aaba80 r8:8027ed34 r7:ed711e60 r6:85aabb00 r5:85ad1800 Workqueue: events bpf_prog_free_deferred 9d20: e9e67000 eaeeb000 00000001 80239bb8 7f3d7000 00000001 82ac11c4 82ac05a0 r4:eaec9dc0 r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:659 state:D stack:0 pid:7110 tgid:7110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed705d84 r8:00000002 r7:60000013 r6:ed705d8c r5:85ad2400 r4:85ad2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ad2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed705e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abfc00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ad2400 r7:00000000 r6:83018200 r5:00001000 r4:7f411000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2af000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2f38c r4:85a2f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2f38c r4:85aabb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ad2400 r8:85aabbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aabb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aabb80 r8:8027ed34 r7:ed711e60 r6:85aabc00 r5:85ad2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed705fb0 to 0xed705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85abfb00 INFO: task kworker/1:659:7110 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85216000 r8:80200be4 r7:eaec9d54 r6:ffffffff r5:85216000 Exception stack(0xeaec9d20 to 0xeaec9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) r4:851e4ec0 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abfec0 r10:61c88647 r9:85ad3000 r8:85aabcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaec9d20 to 0xeaec9d68) r4:82ac11e4 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:661:7115 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:661 state:D stack:0 pid:7115 tgid:7115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed71dd84 r8:00000002 r7:60000113 r6:ed71dd8c r5:85ad5400 r4:85ad5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ad5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed71de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ad5400 r7:00000000 r6:83018200 r5:00001000 r4:7f417000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2f7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2fb8c r4:85a2f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2fb8c r4:85aabd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ad5400 r8:85aabdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aabd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aabd80 r8:8027ed34 r7:ed715e60 r6:85aabe00 r5:85ad5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed71dfb0 to 0xed71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85abfe80 INFO: task kworker/1:661:7115 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 Exception stack(0xeaec9fb0 to 0xeaec9ff8) Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:ed721d84 r8:00000002 r7:60000113 r6:ed721d8c r5:85ad6000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85a2ff8c r4:85a2fc00 r4:85aabe80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaec9dc0 r5:eaec9e08 r4:eaec9dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84879d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879d00 r8:8027ed34 r7:eaec1e60 r6:8497d000 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e4ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:663:7119 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:663 state:D stack:0 pid:7119 tgid:7119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed725d84 r8:00000002 r7:60000113 r6:ed725d8c r5:85ad6c00 r4:85ad6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ad6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed725e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aca2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ad6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f41b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed533000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b4c38c r4:85b4c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b4c38c r4:85aabf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ad6c00 r8:85aabfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85aabf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aabf80 r8:8027ed34 r7:ed721e60 r6:85acd000 r5:85ad6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed725fb0 to 0xed725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aca080 INFO: task kworker/1:663:7119 is blocked on a mutex likely owned by task kworker/0:416:4498. task:kworker/0:416 state:R running task stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a200 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85a50b8c r4:84879d00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:ed541000 r10:61c88647 r9:85a46c00 r8:85acd0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:851a3c00 r4:829187f0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84879f00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:665:7123 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:665 state:D stack:0 pid:7123 tgid:7123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed729d84 r8:00000002 r7:60000013 r6:ed729d8c r5:85a46000 r4:85a46000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a46000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed729e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aca640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a46000 r7:00000000 r6:83018200 r5:00001000 r4:7f421000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed559000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b4cf8c r4:85b4cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b4cf8c r4:85acd100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a46000 r8:85acd12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acd100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acd100 r8:8027ed34 r7:ed719e60 r6:85533600 r5:85a46000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed729fb0 to 0xed729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aca3c0 INFO: task kworker/1:665:7123 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf0dd84 r8:00000002 r7:60070113 r6:eaf0dd8c r5:851a3c00 r4:851a3c00 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) Workqueue: events bpf_prog_free_deferred r5:85a41800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aca4c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed731fb0 to 0xed731ff8) r4:85aca500 Call trace: dd60: 90070113 ffffffff r4:eaf0ddc0 r4:00000000 r5:85a5178c r4:85a51400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:667 state:D stack:0 pid:7127 tgid:7127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed739d84 r8:00000002 r7:60000013 r6:ed739d8c r5:85a44800 r4:85a44800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a44800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed739e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aca700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a44800 r7:00000000 r6:83018200 r5:00001000 r4:7f423000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed567000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b4d38c r4:85b4d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b4d38c r4:85acd200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a44800 r8:85acd22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acd200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acd200 r8:8027ed34 r7:ed729e60 r6:85533700 r5:85a44800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed739fb0 to 0xed739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aca5c0 INFO: task kworker/1:667:7127 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 7faaa000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 90070113 ffffffff r5:90070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a5178c r4:85a51400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:668:7129 blocked for more than 473 seconds. r4:85a40000 r5:85a40000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed741e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a40000 r7:00000000 r6:83018200 r5:00001000 r4:7f431000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5cd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b4eb8c r4:85b4e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b4eb8c r4:85acd280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a40000 r8:85acd2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acd280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acd280 r8:8027ed34 r7:ed739e60 r6:85533780 r5:85a40000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed741fb0 to 0xed741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aca9c0 INFO: task kworker/1:668:7129 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:669:7130 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:669 state:D stack:0 pid:7130 tgid:7130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:85a48000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed745e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aca880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a48000 r7:00000000 r6:83018200 r5:00001000 r4:7f427000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed571000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:85b4d78c r4:85acd300 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r5:00001000 r4:ecf7b000 r5:85a5178c r4:85a51400 r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85a49800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b4db8c r4:85acd380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a49800 r8:85acd3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acd380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acd380 r8:8027ed34 r7:ed741e60 r6:85533880 r5:85a49800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed74dfb0 to 0xed74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aca800 INFO: task kworker/1:670:7132 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8040c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) INFO: task kworker/1:671:7134 blocked for more than 473 seconds. r5:85a48c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r9:83018205 r8:85a48c00 r7:00000000 r6:83018200 r5:00001000 r4:7f42b000 r10:61c88647 r9:85a48c00 r8:85acd42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:671:7134 is blocked on a mutex likely owned by task kworker/0:421:4512. dd60: 80070113 ffffffff r4:eaf0ddc0 r5:00001000 r4:ecf7b000 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85a4a400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed75de08 r5:00001000 r4:ed5b1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b4e38c r4:85b4e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b4e38c r4:85acd480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a4a400 r8:85acd4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acd480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acd480 r8:8027ed34 r7:ed741e60 r6:85533980 r5:85a4a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed75dfb0 to 0xed75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85acabc0 INFO: task kworker/1:672:7136 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 80acc000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:673:7138 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:673 state:D stack:0 pid:7138 tgid:7138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed765d84 r8:00000002 r7:60000113 r6:ed765d8c r5:85a4b000 r5:85a4b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed765e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85acad80 r7:ddde2d40 r6:83018200 r5:85b4e78c r4:85acd500 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:674:7141 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:674 state:D stack:0 pid:7141 tgid:7141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed775d84 r8:00000002 r7:60000013 r6:ed775d8c r5:85a4bc00 r4:85a4bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a4bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed775e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b16040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a4bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f50b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed76d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b4ef8c r4:85b4ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b4ef8c r4:85acd580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a4bc00 r8:85acd5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acd580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acd580 r8:8027ed34 r7:ed741e60 r6:85533a80 r5:85a4bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed775fb0 to 0xed775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85acadc0 INFO: task kworker/1:674:7141 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 810e5000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:675:7142 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:675 state:D stack:0 pid:7142 tgid:7142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed779d84 r8:00000002 r7:60000013 r6:ed779d8c r5:85a4e000 r4:85a4e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a4e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed779e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b16300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a4e000 r7:00000000 r6:83018200 r5:00001000 r4:7f50f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed789000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b4f78c r4:85b4f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b4f78c r4:85acd600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a4e000 r8:85acd62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acd600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acd600 r8:8027ed34 r7:ed775e60 r6:85533b00 r5:85a4e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed779fb0 to 0xed779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85acaf00 INFO: task kworker/1:675:7142 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 810e5000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:676:7144 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:676 state:D stack:0 pid:7144 tgid:7144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed78dd84 r8:00000002 r7:60000113 r6:ed78dd8c r5:85a4d400 r4:85a4d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a4d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed78de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b16140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a4d400 r7:00000000 r6:83018200 r5:00001000 r4:7f50d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed783000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b4f38c r4:85b4f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b4f38c r4:85acd680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a4d400 r8:85acd6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acd680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acd680 r8:8027ed34 r7:ed779e60 r6:85533b80 r5:85a4d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed78dfb0 to 0xed78dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b16100 INFO: task kworker/1:676:7144 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 81323000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:677:7147 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:677 state:D stack:0 pid:7147 tgid:7147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed6e9d84 r8:00000002 r7:60000113 r6:ed6e9d8c r5:85ad0c00 r4:85ad0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ad0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6e9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b166c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ad0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f515000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7a3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b4ff8c r4:85b4fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b4ff8c r4:85acd700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ad0c00 r8:85acd72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acd700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acd700 r8:8027ed34 r7:ed779e60 r6:85acd780 r5:85ad0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6e9fb0 to 0xed6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b162c0 INFO: task kworker/1:677:7147 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 81671000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:678:7150 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:678 state:D stack:0 pid:7150 tgid:7150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed7a1d84 r8:00000002 r7:60000013 r6:ed7a1d8c r5:85ad9800 r4:85ad9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ad9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b16500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ad9800 r7:00000000 r6:83018200 r5:00001000 r4:7f513000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed799000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b4fb8c r4:85b4f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b4fb8c r4:85acd800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ad9800 r8:85acd82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acd800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acd800 r8:8027ed34 r7:ed6e9e60 r6:85acd880 r5:85ad9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7a1fb0 to 0xed7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b164c0 INFO: task kworker/1:678:7150 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 81671000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:679:7152 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:679 state:D stack:0 pid:7152 tgid:7152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed72dd84 r8:00000002 r7:60000013 r6:ed72dd8c r5:85ada400 r4:85ada400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ada400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed72de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b16840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ada400 r7:00000000 r6:83018200 r5:00001000 r4:7f517000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5038c r4:85b50000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b5038c r4:85acd900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ada400 r8:85acd92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acd900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acd900 r8:8027ed34 r7:ed6e9e60 r6:85acd980 r5:85ada400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed72dfb0 to 0xed72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b16680 INFO: task kworker/1:679:7152 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 81be3000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:680:7154 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:680 state:D stack:0 pid:7154 tgid:7154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed7bdd84 r8:00000002 r7:60000013 r6:ed7bdd8c r5:85adbc00 r4:85adbc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85adbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7bde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b16a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85adbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f519000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7b3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5078c r4:85b50400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b5078c r4:85acda00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85adbc00 r8:85acda2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acda00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acda00 r8:8027ed34 r7:ed72de60 r6:85acda80 r5:85adbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7bdfb0 to 0xed7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b16b80 INFO: task kworker/1:680:7154 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 81f08000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:7156 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:681 state:D stack:0 pid:7156 tgid:7156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed7b1d84 r8:00000002 r7:60000013 r6:ed7b1d8c r5:85ad8000 r4:85ad8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ad8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7b1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b16c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ad8000 r7:00000000 r6:83018200 r5:00001000 r4:7f51b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7b9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b50b8c r4:85b50800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b50b8c r4:85acdb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ad8000 r8:85acdb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acdb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acdb00 r8:8027ed34 r7:ed7bde60 r6:85acdb80 r5:85ad8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7b1fb0 to 0xed7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b16a00 INFO: task kworker/1:681:7156 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 81f08000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:682:7158 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:682 state:D stack:0 pid:7158 tgid:7158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed7d1d84 r8:00000002 r7:60000113 r6:ed7d1d8c r5:85adb000 r4:85adb000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85adb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7d1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a32f40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85adb000 r7:00000000 r6:83018200 r5:00001000 r4:7f521000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b50f8c r4:85b50c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b50f8c r4:85acdc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85adb000 r8:85acdc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acdc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acdc00 r8:8027ed34 r7:ed7b1e60 r6:85acdc80 r5:85adb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7d1fb0 to 0xed7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b16c00 INFO: task kworker/1:682:7158 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85add400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7dde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0d040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85add400 r7:00000000 r6:83018200 r5:00001000 r4:7f523000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7e5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5138c r4:85b51000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b5138c r4:85acdd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85add400 r8:85acdd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acdd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acdd00 r8:8027ed34 r7:ed7d1e60 r6:85acdd80 r5:85add400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7ddfb0 to 0xed7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b0d080 INFO: task kworker/1:683:7162 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 822ff000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85adc800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:85adc800 r7:00000000 r6:83018200 r5:00001000 r4:7f525000 r10:61c88647 r9:85adc800 r8:85acde2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaf0dd20 to 0xeaf0dd68) r4:eaf0ddc0 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847915c0 Workqueue: events bpf_prog_free_deferred r5:85ade000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:85b51b8c r4:85acdf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ade000 r8:85acdf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85acdf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85acdf00 r8:8027ed34 r7:ed781e60 r6:85acdf80 r5:85ade000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7c5fb0 to 0xed7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b0d180 INFO: task kworker/1:685:7166 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 82b40000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:686 state:D stack:0 pid:7168 tgid:7168 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85adec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7f5e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:7170 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:687 state:D stack:0 pid:7170 tgid:7170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed7fdd84 r8:00000002 r7:60000013 r6:ed7fdd8c r5:85ad8c00 r4:85ad8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ad8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7fde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0d680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ad8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f52b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed805000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5238c r4:85b52000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b5238c r4:85b1c000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ad8c00 r8:85b1c02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b1c000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b1c000 r8:8027ed34 r7:ed7f5e60 r6:85b1c180 r5:85ad8c00 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r5:85a5178c r4:85a51400 r4:84879f00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:688 state:D stack:0 pid:7172 tgid:7172 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed809e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0d880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ad4800 r7:00000000 r6:83018200 r5:00001000 r4:7f52d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed813000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5278c r4:85b52400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b5278c r4:85b1c200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ad4800 r8:85b1c22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b1c200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b1c200 r8:8027ed34 r7:ed7fde60 r6:85b1c280 r5:85ad4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed809fb0 to 0xed809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b0d340 INFO: task kworker/1:688:7172 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 831c5000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:00000000 r5:00001000 r4:ecf7b000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 r4:847915c0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85ad3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed811e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85b52b8c r4:85b1c300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ad3c00 r8:85b1c32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b1c300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b1c300 r8:8027ed34 r7:ed809e60 r6:85b1c380 r5:85ad3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed811fb0 to 0xed811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b0d740 INFO: task kworker/1:689:7174 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8343c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85ae0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed81de08 r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:85b1c400 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:85a5178c r4:85a51400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:691:7178 blocked for more than 474 seconds. r5:85ae0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0dd40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ae0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5378c r4:85b53400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b5378c r4:85b1c500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae0c00 r8:85b1c52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b1c500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b1c500 r8:8027ed34 r7:ed81de60 r6:85b1c580 r5:85ae0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed825fb0 to 0xed825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b0dac0 INFO: task kworker/1:691:7178 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 834f0000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:692:7180 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:692 state:D stack:0 pid:7180 tgid:7180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85a4ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed83de08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed82d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5338c r4:85b53000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b5338c r4:85b1c600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a4ec00 r8:85b1c62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b1c600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b1c600 r8:8027ed34 r7:ed825e60 r6:85533c00 r5:85a4ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed83dfb0 to 0xed83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b0dbc0 INFO: task kworker/1:692:7180 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 839af000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85a4c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ecdbf000 r7:ddde2d40 r6:83018200 r5:85b53b8c r4:85b1c680 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r5:85a5178c r4:85a51400 r4:84879f00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85720c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed849e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5c38c r4:85b5c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b5c38c r4:85b1c700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85720c00 r8:85b1c72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b1c700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b1c700 r8:8027ed34 r7:ed841e60 r6:85533d00 r5:85720c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed849fb0 to 0xed849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85aced40 INFO: task kworker/1:694:7184 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 83d59000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:695:7185 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:695 state:D stack:0 pid:7185 tgid:7185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed84dd84 r8:00000002 r7:60000013 r6:ed84dd8c r5:85721800 r4:85721800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85721800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed84de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2f3c0 r9:83018205 r8:85721800 r7:00000000 r6:83018200 r5:00001000 r4:7f4af000 r10:61c88647 r9:85721800 r8:85b1c7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:00000000 r5:00001000 r4:ecf7b000 r5:85a5178c r4:85a51400 r4:00000001 Workqueue: events bpf_prog_free_deferred r5:85722400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2f4c0 r5:85b5cf8c r4:85b5cc00 r4:85b1c880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:697:7193 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:697 state:D stack:0 pid:7193 tgid:7193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed859d84 r8:00000002 r7:60000013 r6:ed859d8c r5:85723000 r4:85723000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85723000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed859e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2f640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85723000 r7:00000000 r6:83018200 r5:00001000 r4:7f4b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed363000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5d38c r4:85b5d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b5d38c r4:85b1c900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85b1c900 r8:8027ed34 r7:ed851e60 r6:85533e80 r5:85723000 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:698:7195 blocked for more than 474 seconds. r4:85723c00 r5:85723c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed861e08 r10:00000000 r9:85b1c980 r8:8027ed34 r7:ed859e60 r6:85533f00 r5:85723c00 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b2f580 INFO: task kworker/1:698:7195 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 848f5000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85ae2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85b5d78c r4:85b5d400 r7:ddde2d40 r6:83018200 r5:85b5d78c r4:85b1ca00 r10:00000000 r9:85b1ca00 r8:8027ed34 r7:ed861e60 r6:85b1ca80 r5:85ae2400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070113 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:ed85dd84 r8:00000002 r7:60000113 r6:ed85dd8c r5:85ae3000 r5:85ae3000 r4:829187f0 r4:00000000 r9:83018205 r8:85ae3000 r7:00000000 r6:83018200 r5:00001000 r4:7f4b9000 dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b2f900 INFO: task kworker/1:700:7199 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 84c29000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:701:7200 blocked for more than 474 seconds. task:kworker/1:701 state:D stack:0 pid:7200 tgid:7200 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85ae3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed831e08 r9:83018205 r8:85ae3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4bb000 r7:ddde2d40 r6:83018200 r5:85b5e38c r4:85b1cc00 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 dfa0: 00000000 00000000 00000000 00000000 r5:85ae4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed869e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2fcc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ae4800 r7:00000000 r6:83018200 r5:00001000 r4:7f4bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3b3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5e78c r4:85b5e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b5e78c r4:85b1cd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae4800 r8:85b1cdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b1cd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b1cd80 r8:8027ed34 r7:ed831e60 r6:85b1ce00 r5:85ae4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed869fb0 to 0xed869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b2fbc0 INFO: task kworker/1:702:7203 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 dd60: 80070113 ffffffff r4:eaf0ddc0 r5:00001000 r4:ecf7b000 r4:84879f00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:703 state:D stack:0 pid:7205 tgid:7205 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85ae5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:85ae5400 r7:00000000 r6:83018200 r5:00001000 r4:7f4c1000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed871fb0 to 0xed871ff8) task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r5:85a5178c r4:85a51400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:704 state:D stack:0 pid:7206 tgid:7206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed86dd84 r8:00000002 r7:60000113 r6:ed86dd8c r5:85ae6c00 r4:85ae6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ae6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed86de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2f300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ae6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4c3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3e3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5ef8c r4:85b5ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b5ef8c r4:85b1cf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae6c00 r8:85b1cf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b1cf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b1cf00 r8:8027ed34 r7:ed871e60 r6:85b1cf80 r5:85ae6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed86dfb0 to 0xed86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b2fdc0 INFO: task kworker/1:704:7206 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 85211000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85ae1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaf0dd20 to 0xeaf0dd68) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:706:7211 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:706 state:D stack:0 pid:7211 tgid:7211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed879d84 r8:00000002 r7:60000113 r6:ed879d8c r5:85ae6000 r4:85ae6000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ae6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed879e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3d1c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ae6000 r7:00000000 r6:83018200 r5:00001000 r4:7f4c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed40d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:85b5f78c r4:85b3b080 Exception stack(0xed879fb0 to 0xed879ff8) task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaf0ddc0 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:707:7214 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:707 state:D stack:0 pid:7214 tgid:7214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed87dd84 r8:00000002 r7:60000013 r6:ed87dd8c r5:85af0000 r4:85af0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85af0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed87de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ed421000 Exception stack(0xed87dfb0 to 0xed87dff8) dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:708:7215 blocked for more than 474 seconds. task:kworker/1:708 state:D stack:0 pid:7215 tgid:7215 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85af0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed881e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85af0c00 r8:85b3b2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaf0dd20 to 0xeaf0dd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:709 state:D stack:0 pid:7218 tgid:7218 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85af1800 r4:829187f0 r4:00000000 r9:83018205 r8:85af1800 r7:00000000 r6:83018200 r5:00001000 r4:7f4cd000 r10:61c88647 r9:85af1800 r8:85b3b3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:eaf0ddc0 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:710:7219 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:710 state:D stack:0 pid:7219 tgid:7219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed88dd84 r8:00000002 r7:60000013 r6:ed88dd8c r5:85af3000 r4:85af3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85af3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed88de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3d980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85af3000 r7:00000000 r6:83018200 r5:00001000 r4:7f4cf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed467000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6478c r4:85b64400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b6478c r4:85b3b480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85af3000 r8:85b3b4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b3b480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3b480 r8:8027ed34 r7:ed889e60 r6:85b3b500 r5:85af3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed88dfb0 to 0xed88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b3d4c0 INFO: task kworker/1:710:7219 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:80070113 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r5:85a5178c r4:85a51400 r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:711:7221 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred r5:85af4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85b64b8c r4:85b64800 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8613e000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:712:7223 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:712 state:D stack:0 pid:7223 tgid:7223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed885d84 r8:00000002 r7:60000113 r6:ed885d8c r5:85af2400 r4:85af2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85af2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed885e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b21b80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85af2400 r7:00000000 r6:83018200 r5:00001000 r4:7f4d5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6538c r4:85b65000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b6538c r4:85b3b580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85af2400 r8:85b3b5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b3b580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3b580 r8:8027ed34 r7:ed891e60 r6:85b3b700 r5:85af2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed885fb0 to 0xed885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b3da80 INFO: task kworker/1:712:7223 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85af3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3dcc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85af3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4d3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed497000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b64f8c r4:85b64c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b64f8c r4:85b3b780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85af3c00 r8:85b3b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b3b780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3b780 r8:8027ed34 r7:ed885e60 r6:85b3b800 r5:85af3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed895fb0 to 0xed895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b21300 INFO: task kworker/1:713:7225 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 86877000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85af5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b42040 r4:85b3b880 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeaf0dd20 to 0xeaf0dd68) r4:eaf0ddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:715:7229 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:715 state:D stack:0 pid:7229 tgid:7229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed8a1d84 r8:00000002 r7:60000113 r6:ed8a1d8c r5:85af8c00 r4:85af8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85af8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b424c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85af8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4db000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4f1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b65b8c r4:85b65800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b65b8c r4:85b3b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85af8c00 r8:85b3b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b42200 INFO: task kworker/1:715:7229 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 86d30000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:716 state:D stack:0 pid:7232 tgid:7232 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85af9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:85b423c0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:eaf0ddc0 r5:00001000 r4:ecf7b000 r4:84879f00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ed8b5d84 r8:00000002 r7:60000113 r6:ed8b5d8c r5:85afa400 r5:85afa400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b42a00 r10:61c88647 r9:85afa400 r8:85b3bbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:eaf0ddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:718:7238 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:718 state:D stack:0 pid:7238 tgid:7238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed8b9d84 r8:00000002 r7:60000113 r6:ed8b9d8c r5:85afbc00 r4:85afbc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85afbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8b9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b42c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85afbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f4e5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed697000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6678c r4:85b66400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b6678c r4:85b3bc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85afbc00 r8:85b3bcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85a5178c r4:85a51400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85af8000 r4:829187f0 r4:00000000 r4:85b3bd80 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85afd400 r5:85afd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8bde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3a040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85afd400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6738c r4:85b67000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b6738c r4:85b3be80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85afd400 r8:85b3beac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b3be80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3be80 r8:8027ed34 r7:ed8b1e60 r6:85b3bf00 r5:85afd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed8bdfb0 to 0xed8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 r4:84879f00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85afc800 r4:829187f0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85afe000 r4:829187f0 r4:00000000 r10:61c88647 r9:85afe000 r8:85b370ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed89dfb0 to 0xed89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b3a300 INFO: task kworker/1:722:7250 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 87e64000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:ecf7b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85afec00 r4:829187f0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r5:85a5178c r4:85a51400 r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:724:7322 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:724 state:D stack:0 pid:7322 tgid:7322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85af6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85b67b8c r4:85b37280 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85af6000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8a5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abe2c0 r4:00000000 r9:83018205 r8:85af6000 r7:00000000 r6:83018200 r5:00001000 r4:7f523000 r10:61c88647 r9:85af6000 r8:85b373ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaf0ddc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:726:7336 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:726 state:D stack:0 pid:7336 tgid:7336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed951d84 r8:00000002 r7:60000113 r6:ed951d8c r5:85afb000 r5:85afb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85b7038c r4:85b70000 r4:00000001 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:7339 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:7339 tgid:7339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed955d84 r8:00000002 r7:60000013 r6:ed955d8c r5:85b00000 r4:85b00000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b00000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed955e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85b37580 r4:85abe380 Exception stack(0xeaf0dd20 to 0xeaf0dd68) r4:82ac11e4 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:728:7341 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:728 state:D stack:0 pid:7341 tgid:7341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed959d84 r8:00000002 r7:60000113 r6:ed959d8c r5:85b00c00 r4:85b00c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b00c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed959e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:729:7344 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:729 state:D stack:0 pid:7344 tgid:7344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed95dd84 r8:00000002 r7:60000113 r6:ed95dd8c r5:85b01800 r4:85b01800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b01800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed95de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abe8c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85b01800 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6ff000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b70f8c r4:85b70c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b70f8c r4:85b37780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b01800 r8:85b377ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b37780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r5:85a5178c r4:85a51400 r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:7347 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:7347 tgid:7347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb921d84 r8:00000002 r7:60000113 r6:eb921d8c r5:85b02400 r4:85b02400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b02400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb921e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85b71b8c r4:85b37880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b02400 r8:85b378ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b37880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b37880 r8:8027ed34 r7:ed95de60 r6:85b37900 r5:85b02400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb921fb0 to 0xeb921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85abe800 INFO: task kworker/1:730:7347 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:731:7349 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:731 state:D stack:0 pid:7349 tgid:7349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85b03000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed93de08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b7178c r4:85b37980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b03000 r8:85b379ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b37980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b37980 r8:8027ed34 r7:eb921e60 r6:85b37a00 r5:85b03000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed93dfb0 to 0xed93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:eaf0ddc0 r5:00001000 r4:ecf7b000 r4:84879f00 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:732:7385 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:732 state:D stack:0 pid:7385 tgid:7385 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85b05400 r5:85b05400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:85b05400 r7:00000000 r6:83018200 r5:00001000 r4:7f579000 r7:ddde2d40 r6:83018200 r5:85b71f8c r4:85b37a80 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8a1fc000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) task:kworker/1:733 state:D stack:0 pid:7389 tgid:7389 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed9bde08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab6b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85b04800 r7:00000000 r6:83018200 r5:00001000 r4:7f57b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9c5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bda78c r4:85bda400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bda78c r4:85b37b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b04800 r8:85b37bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b37b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b37b80 r8:8027ed34 r7:ed965e60 r6:85b37c00 r5:85b04800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r4:eaf0ddc0 r5:00001000 r4:ecf7b000 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 task:kworker/1:734 state:D stack:0 pid:7391 tgid:7391 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85b03c00 r7:00000000 r6:83018200 r5:00001000 r4:7f57d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9cb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b7238c r4:85b72000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b7238c r4:85b37c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b03c00 r8:85b37cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b37c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b37c80 r8:8027ed34 r7:ed9bde60 r6:85b37d00 r5:85b03c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80070113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 INFO: task kworker/1:735:7393 blocked for more than 475 seconds. r5:85b06000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:85b7278c r4:85b72400 r4:00000001 Exception stack(0xed9a9fb0 to 0xed9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab6d00 INFO: task kworker/1:735:7393 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8acce000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:736:7395 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:736 state:D stack:0 pid:7395 tgid:7395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed9d5d84 r8:00000002 r7:60000113 r6:ed9d5d8c r5:85b06c00 r4:85b06c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b06c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed9d5e08 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r5:80070113 r4:80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:83a0ec00 r5:83a0ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed9e5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab6740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a0ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f583000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9e1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b72b8c r4:85b72800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b72b8c r4:85b37f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a0ec00 r8:85b37fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeaf0dd20 to 0xeaf0dd68) r5:85a5178c r4:85a51400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8506a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda99e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a3cb00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b72f8c r4:85b72c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84368700 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r5:85069800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:85bea38c r4:85bea000 r4:85a3cec0 r4:82ac11e4 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8506e000 r4:829187f0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:84879f00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8506bc00 r4:829187f0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85808f40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f677000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc6d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847ff78c r4:847ff400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847ff78c r4:855e4280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 INFO: task kworker/1:742:7544 blocked for more than 475 seconds. r5:8506b000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000000 r4:00000000 r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:743:7546 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:743 state:D stack:0 pid:7546 tgid:7546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:edc79d84 r8:00000002 r7:60000113 r6:edc79d8c r5:85068c00 r4:85068c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85068c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc79e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598e940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85068c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6cb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd11000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b12f8c r4:85b12c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b12f8c r4:855e4480 r4:855e4480 9fa0: 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:7589 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:744 state:D stack:0 pid:7589 tgid:7589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8506ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598e540 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80070113 ffffffff r4:eaf0ddc0 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:84879f00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8506c800 r4:829187f0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 5fa0: 00000000 00000000 00000000 00000000 r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:85068000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc85e08 r4:855e4780 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Call trace: r5:8506d400 r4:829187f0 r4:00000000 r4:855e4880 INFO: task kworker/1:747:7628 is blocked on a mutex likely owned by task kworker/0:421:4512. r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:748:7632 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:748 state:D stack:0 pid:7632 tgid:7632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:edd69d84 r8:00000002 r7:60000113 r6:edd69d8c r5:85888000 r4:85888000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85888000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd69e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000000 r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85889800 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:8480038c r4:84800000 r4:855e4a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e4a80 r8:8027ed34 r7:edd69e60 r6:855e4b00 r5:85889800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedda1fb0 to 0xedda1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854823c0 INFO: task kworker/1:749:7643 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd60: 80070113 ffffffff r5:00001000 r4:ecf7b000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:8588a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8d776000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 r4:00000001 task:kworker/1:751 state:D stack:0 pid:7654 tgid:7654 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8588bc00 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482f40 9fa0: 00000000 00000000 00000000 00000000 r4:eaf0ddc0 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:752:7676 blocked for more than 475 seconds. r10:829187f4 r9:eddd5d84 r8:00000002 r7:60000113 r6:eddd5d8c r5:8588d400 r5:8588d400 r4:829187f0 r4:00000000 r4:855e4d80 INFO: task kworker/1:752:7676 is blocked on a mutex likely owned by task kworker/0:421:4512. dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r5:8588e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/1:753:7699 is blocked on a mutex likely owned by task kworker/0:421:4512. r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:847915c0 task:kworker/1:754 state:D stack:0 pid:7712 tgid:7712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ede15d84 r8:00000002 r7:60000113 r6:ede15d8c r5:8588ec00 r4:8588ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8588ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede15e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474e840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8588ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f7bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:eaf0ddc0 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 INFO: task kworker/1:755:7738 blocked for more than 475 seconds. r5:8588c800 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab7d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8588c800 r7:00000000 r6:83018200 r5:00001000 r4:7f7f5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf05000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c4ab8c r4:85c4a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c4ab8c r4:859ad080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 r4:eaf0ddc0 r5:85a5178c r4:85a51400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85290000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd95e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854886c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85290000 r7:00000000 r6:83018200 r5:00001000 r4:7f82f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:859ad180 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd95fb0 to 0xedd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab7a80 INFO: task kworker/1:756:7768 is blocked on a mutex likely owned by task kworker/0:421:4512. Exception stack(0xeaf0dd20 to 0xeaf0dd68) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) task:kworker/1:757 state:D stack:0 pid:7798 tgid:7798 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85293000 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85488300 9fa0: 00000000 00000000 00000000 00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 INFO: task kworker/1:758:7802 blocked for more than 475 seconds. task:kworker/1:758 state:D stack:0 pid:7802 tgid:7802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:edfd5d84 r8:00000002 r7:60000113 r6:edfd5d8c r5:85293c00 r4:85293c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85293c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edfd5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85488880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85293c00 r7:00000000 r6:83018200 r5:00001000 r4:7f831000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda23000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f9f8c r4:858f9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 Workqueue: events bpf_prog_free_deferred r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:847915c0 r5:85291800 r4:829187f0 r4:00000000 r5:858fa38c r4:858fa000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8efe5000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Call trace: r5:85294800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:00000000 r9:859ad580 r8:8027ed34 r7:edfd9e60 r6:859ad600 r5:85294800 dd60: 80070113 ffffffff r5:00001000 r4:ecf7b000 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:7808 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85296000 r5:85296000 r4:829187f0 r4:00000000 r5:858fab8c r4:858fa800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:762:7810 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:7810 tgid:7810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:edfe1d84 r8:00000002 r7:60000013 r6:edfe1d8c r5:85295400 r5:85295400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edfe1e08 r10:00000000 r9:859ad780 r8:8027ed34 r7:edfdde60 r6:859ad800 r5:85295400 INFO: task kworker/1:762:7810 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) r4:85290c00 r5:85290c00 r4:829187f0 r4:00000000 r5:858fb38c r4:858fb000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:829187f4 r9:edfedd84 r8:00000002 r7:60000113 r6:edfedd8c r5:85296c00 r5:85296c00 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a39300 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8fb05000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r4:eaf0ddc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:85726000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:859ada80 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:766:7819 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:766 state:D stack:0 pid:7819 tgid:7819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:edf51d84 r8:00000002 r7:60000013 r6:edf51d8c r5:85724800 r4:85724800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85724800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:84879f00 task:kworker/1:767 state:D stack:0 pid:7821 tgid:7821 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d40 r6:83018200 r5:844a938c r4:859adb80 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:84879f00 INFO: task kworker/1:768:7822 blocked for more than 475 seconds. [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edff5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a39540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85726c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede07000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84800f8c r4:84800c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84800f8c r4:859adc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85726c00 r8:859adc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859adc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859adc00 r8:8027ed34 r7:edff1e60 r6:85965100 r5:85726c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedff5fb0 to 0xedff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a39700 INFO: task kworker/1:768:7822 is blocked on a mutex likely owned by task kworker/0:421:4512. Exception stack(0xeaf0dd20 to 0xeaf0dd68) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r5:85292400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edff9e08 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeaf0dd20 to 0xeaf0dd68) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84879f00 INFO: task kworker/1:770:7828 blocked for more than 475 seconds. r5:85888c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a39d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85888c00 r7:00000000 r6:83018200 r5:00001000 r4:7f84d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede91000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Not tainted 6.15.0-syzkaller #0 r5:858a0c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:859ade80 INFO: task kworker/1:771:7830 is blocked on a mutex likely owned by task kworker/0:421:4512. r5:00001000 r4:ecf7b000 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) task:kworker/1:772 state:D stack:0 pid:7832 tgid:7832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:edffdd84 r8:00000002 r7:60000013 r6:edffdd8c r5:858a0000 r4:858a0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858a0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edffde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ac2040 r10:61c88647 r9:858a0000 r8:859adfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 dd20: 929db000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 r4:84879f00 Not tainted 6.15.0-syzkaller #0 task:kworker/1:773 state:D stack:0 pid:7834 tgid:7834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee00dd84 r8:00000002 r7:60000013 r6:ee00dd8c r5:858a3000 r4:858a3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858a3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee00de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ac2580 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaf0ddc0 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:84879f00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:858a1800 r4:829187f0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 934c6000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 Call trace: r5:858a3c00 r4:829187f0 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 task:kworker/1:776 state:D stack:0 pid:7842 tgid:7842 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:777:7844 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:777 state:D stack:0 pid:7844 tgid:7844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:858a6000 r4:829187f0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:858a6000 r8:85ab34ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85ac2b00 r4:82ac11e4 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:778:7846 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred r5:858a2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85ab3580 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: 94fe7000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r5:858a4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee065e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ac2ec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:858a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f861000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee051000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c65f8c r4:85c65c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c65f8c r4:85ab3680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a4800 r8:85ab36ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85ab3680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab3680 r8:8027ed34 r7:ee059e60 r6:85ab3700 r5:858a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee065fb0 to 0xee065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ac2c80 INFO: task kworker/1:779:7848 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 94fe7000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:00000000 r5:00001000 r4:ecf7b000 r5:85a5178c r4:85a51400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:858a6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee0a5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:858a6c00 r8:85ab37ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:780:7857 is blocked on a mutex likely owned by task kworker/0:421:4512. [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 953de000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:7864 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:7864 tgid:7864 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85c18c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:85c1a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c1a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee009e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f6380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85c1a400 r7:00000000 r6:83018200 r5:00001000 r4:7f7bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7c9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c6738c r4:85c67000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c6738c r4:85ab3980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:eaf0ddc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ee11dd84 r8:00000002 r7:60000113 r6:ee11dd8c r5:85c1c800 r4:85c1c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c1c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee11de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f6580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85c1c800 r7:00000000 r6:83018200 r5:00001000 r4:7f831000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda1b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c67b8c r4:85c67800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c67b8c r4:85ab3a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c1c800 r8:85ab3aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85ab3a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab3a80 r8:8027ed34 r7:ee009e60 r6:85ab3b00 r5:85c1c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee11dfb0 to 0xee11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:783:7908 is blocked on a mutex likely owned by task kworker/0:421:4512. dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:85a5178c r4:85a51400 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) r4:85c1bc00 r5:85c1bc00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c6778c r4:85c67400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c6778c r4:85ab3b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c1bc00 r8:85ab3bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85ab3b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab3b80 r8:8027ed34 r7:ee11de60 r6:85ab3c00 r5:85c1bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee0f5fb0 to 0xee0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f66c0 INFO: task kworker/1:784:7909 is blocked on a mutex likely owned by task kworker/0:421:4512. r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Workqueue: events bpf_prog_free_deferred r5:85c1d400 r4:829187f0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/1:785:7911 is blocked on a mutex likely owned by task kworker/0:421:4512. [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 INFO: task kworker/1:786:7925 blocked for more than 476 seconds. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:85c1ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f84f000 r4:857f6a40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaf0ddc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:788:7938 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:788 state:D stack:0 pid:7938 tgid:7938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee081e08 r7:ddde2d40 r6:83018200 r5:85c7078c r4:85ab3f80 r4:857f6f00 dd60: 80070113 ffffffff [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:789:7940 blocked for more than 476 seconds. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:eaf0ddc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:7942 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:7942 tgid:7942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee15dd84 r8:00000002 r7:60000013 r6:ee15dd8c r5:85c18000 r4:85c18000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c18000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee15de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598c2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85c18000 r7:00000000 r6:83018200 r5:00001000 r4:7f8cd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc65000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c70b8c r4:85c70800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee15dfb0 to 0xee15dff8) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r5:00001000 r4:ecf7b000 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) Call trace: [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:eaf0ddc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee165e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85c10c00 r7:00000000 r6:83018200 r5:00001000 r4:7f8d1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eddaf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7138c r4:85c71000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7138c r4:85824380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c10c00 r8:858243ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85824380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824380 r8:8027ed34 r7:ee161e60 r6:85824400 r5:85c10c00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:793 state:D stack:0 pid:7948 tgid:7948 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:ede21000 r4:00000001 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 99946000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:ede3b000 r4:00000001 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 Not tainted 6.15.0-syzkaller #0 r4:85c13000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xee171fb0 to 0xee171ff8) Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ecf7b000 r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ee175d84 r8:00000002 r7:60000013 r6:ee175d8c r5:85c13c00 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:85c13c00 r7:00000000 r6:83018200 r5:00001000 r4:7f8d9000 r10:61c88647 r9:85c13c00 r8:858246ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8590a540 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:eaf0ddc0 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:7956 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:7956 tgid:7956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee10dd84 r8:00000002 r7:60000013 r6:ee10dd8c r5:85c15400 r4:85c15400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c15400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee10de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590aa80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85c15400 r7:00000000 r6:83018200 r5:00001000 r4:7f8dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf15000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c72b8c r4:85c72800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c72b8c r4:85824880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c15400 r8:858248ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85824880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824880 r8:8027ed34 r7:ee175e60 r6:85824900 r5:85c15400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee10dfb0 to 0xee10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred dd60: 80070113 ffffffff r4:eaf0ddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:85c7278c r4:85c72400 r4:85824980 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8590a540 INFO: task kworker/1:798:7958 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9aadc000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:7960 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xee185fb0 to 0xee185ff8) Workqueue: events bpf_prog_free_deferred dd60: 80070113 ffffffff [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) Not tainted 6.15.0-syzkaller #0 r5:84af8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85824a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824a80 r8:8027ed34 r7:ee185e60 r6:85965280 r5:84af8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee18dfb0 to 0xee18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8590ab80 INFO: task kworker/1:800:7962 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9b70a000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:84af8000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 dd20: 9b70a000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:edf4b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c73b8c r4:85c73800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c73b8c r4:85824b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afbc00 r8:85824bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85824b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824b80 r8:8027ed34 r7:ee199e60 r6:85965380 r5:84afbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1a1fb0 to 0xee1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85488800 INFO: task kworker/1:802:7967 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9bd40000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 INFO: task kworker/1:803:7968 blocked for more than 476 seconds. r4:84af9800 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:85c73f8c r4:85c73c00 r10:00000000 r9:85824c00 r8:8027ed34 r7:ee1a1e60 r6:85965400 r5:84af9800 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaf0ddc0 r4:00000000 r5:85a5178c r4:85a51400 r4:84879f00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7cf8c r4:85c7cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7cf8c r4:85824c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afa400 r8:85824cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85824c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824c80 r8:8027ed34 r7:ee1a5e60 r6:85965480 r5:84afa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1adfb0 to 0xee1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b27e40 INFO: task kworker/1:804:7970 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9c4fc000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:805:7972 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:805 state:D stack:0 pid:7972 tgid:7972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee1b5d84 r8:00000002 r7:60000013 r6:ee1b5d8c r5:84afb000 r5:84afb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1b5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84afb000 r7:00000000 r6:83018200 r5:00001000 r4:7f8e9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf6b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7c38c r4:85c7c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7c38c r4:85824d00 r10:61c88647 r9:84afb000 r8:85824d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 dd20: 9c7ef000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85c14800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856162c0 INFO: task kworker/1:806:7973 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9cc9f000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:807 state:D stack:0 pid:7976 tgid:7976 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:85c7cb8c r4:85824e80 Exception stack(0xee1b9fb0 to 0xee1b9ff8) Workqueue: events bpf_prog_free_deferred dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:84879f00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xee1bdfb0 to 0xee1bdff8) task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaf0ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:809:7980 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:809 state:D stack:0 pid:7980 tgid:7980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee1c1d84 r8:00000002 r7:60000013 r6:ee1c1d8c r5:85078000 r4:85078000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85078000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1c1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078000 r7:00000000 r6:83018200 r5:00001000 r4:7f8f5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee115000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7db8c r4:85c7d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7db8c r4:85834080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:858340ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834080 r8:8027ed34 r7:ee1bde60 r6:85834100 r5:85078000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:eaf0ddc0 r4:00000000 r5:85a5178c r4:85a51400 r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 INFO: task kworker/1:810:7982 blocked for more than 476 seconds. r5:85078c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:85c7d78c r4:85834180 Exception stack(0xee1c5fb0 to 0xee1c5ff8) task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9dc49000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:811:7985 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:811 state:D stack:0 pid:7985 tgid:7985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee1cdd84 r8:00000002 r7:60000013 r6:ee1cdd8c r5:85079800 r4:85079800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85079800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1cde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:ee121000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaf0dd20 to 0xeaf0dd68) r4:eaf0ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee181e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:eaf0ddc0 r4:00000000 r5:85a5178c r4:85a51400 r4:84879f00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f8f9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee12b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7e38c r4:85c7e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7e38c r4:85834480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507bc00 r8:858344ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834480 r8:8027ed34 r7:ee181e60 r6:85834500 r5:8507bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1d5fb0 to 0xee1d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85616bc0 INFO: task kworker/1:813:7989 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9efe5000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 Not tainted 6.15.0-syzkaller #0 r5:8507c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507e000 r7:00000000 r6:83018200 r5:00001000 r4:7f905000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee203000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7ef8c r4:85c7ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7ef8c r4:85834680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507e000 r8:858346ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834680 r8:8027ed34 r7:ee181e60 r6:85834700 r5:8507e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1f9fb0 to 0xee1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8590bfc0 INFO: task kworker/1:815:7994 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9f61d000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:816:7996 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:816 state:D stack:0 pid:7996 tgid:7996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee201d84 r8:00000002 r7:60000013 r6:ee201d8c r5:8507d400 r4:8507d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8507d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee201e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535100 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507d400 r7:00000000 r6:83018200 r5:00001000 r4:7f903000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee1f5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7eb8c r4:85c7e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7eb8c r4:85834780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507d400 r8:858347ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834780 r8:8027ed34 r7:ee1f9e60 r6:85834800 r5:8507d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee201fb0 to 0xee201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855350c0 INFO: task kworker/1:816:7996 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9f61d000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:817:7998 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:817 state:D stack:0 pid:7998 tgid:7998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee20dd84 r8:00000002 r7:60000013 r6:ee20dd8c r5:850a8000 r4:850a8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee20de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855355c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f907000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee209000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7f38c r4:85c7f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7f38c r4:85834880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a8000 r8:858348ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834880 r8:8027ed34 r7:ee1f9e60 r6:85834900 r5:850a8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee20dfb0 to 0xee20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85535340 INFO: task kworker/1:817:7998 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a001c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:818:7999 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:818 state:D stack:0 pid:7999 tgid:7999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee215d84 r8:00000002 r7:60000113 r6:ee215d8c r5:850a9800 r4:850a9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee215e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f90b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee21d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7f78c r4:85c7f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7f78c r4:85834980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a9800 r8:858349ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834980 r8:8027ed34 r7:ee20de60 r6:85834a00 r5:850a9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee215fb0 to 0xee215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85535580 INFO: task kworker/1:818:7999 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a001c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:819:8003 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:819 state:D stack:0 pid:8003 tgid:8003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee229d84 r8:00000002 r7:60000013 r6:ee229d8c r5:850aa400 r4:850aa400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850aa400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee229e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f911000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee237000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8438c r4:85c84000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8438c r4:85834a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850aa400 r8:85834aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834a80 r8:8027ed34 r7:ee215e60 r6:85834b00 r5:850aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee229fb0 to 0xee229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85535180 INFO: task kworker/1:819:8003 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a001c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:820:8005 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:820 state:D stack:0 pid:8005 tgid:8005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee1d1d84 r8:00000002 r7:60000013 r6:ee1d1d8c r5:84afd400 r4:84afd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84afd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1d1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84afd400 r7:00000000 r6:83018200 r5:00001000 r4:7f90d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee22b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7fb8c r4:85c7f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7fb8c r4:85834b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afd400 r8:85834bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834b80 r8:8027ed34 r7:ee229e60 r6:85965580 r5:84afd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1d1fb0 to 0xee1d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85535a40 INFO: task kworker/1:820:8005 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a0919000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:821:8007 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:821 state:D stack:0 pid:8007 tgid:8007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee1e5d84 r8:00000002 r7:60000113 r6:ee1e5d8c r5:84afc800 r4:84afc800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84afc800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1e5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535b40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84afc800 r7:00000000 r6:83018200 r5:00001000 r4:7f90f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee231000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7ff8c r4:85c7fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7ff8c r4:85834c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afc800 r8:85834c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834c00 r8:8027ed34 r7:ee229e60 r6:85965600 r5:84afc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1e5fb0 to 0xee1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85535b80 INFO: task kworker/1:821:8007 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a0e5c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:822:8009 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:822 state:D stack:0 pid:8009 tgid:8009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee241d84 r8:00000002 r7:60000113 r6:ee241d8c r5:84afec00 r4:84afec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84afec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee241e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84afec00 r7:00000000 r6:83018200 r5:00001000 r4:7f7bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c84f8c r4:85c84c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c84f8c r4:85834c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afec00 r8:85834cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834c80 r8:8027ed34 r7:ee229e60 r6:85965680 r5:84afec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee241fb0 to 0xee241ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85535cc0 INFO: task kworker/1:822:8009 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a1828000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:823:8011 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:823 state:D stack:0 pid:8011 tgid:8011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee155d84 r8:00000002 r7:60000013 r6:ee155d8c r5:84afe000 r4:84afe000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84afe000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee155e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f913000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee23d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8478c r4:85c84400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8478c r4:85834d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afe000 r8:85834d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834d00 r8:8027ed34 r7:ee241e60 r6:85965700 r5:84afe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee155fb0 to 0xee155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855354c0 INFO: task kworker/1:823:8011 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a1828000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:824:8014 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:824 state:D stack:0 pid:8014 tgid:8014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee251d84 r8:00000002 r7:60000113 r6:ee251d8c r5:85cc8c00 r4:85cc8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cc8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee251e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535f40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cc8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f75f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd1f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c84b8c r4:85c84800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c84b8c r4:85834d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cc8c00 r8:85834dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834d80 r8:8027ed34 r7:ee241e60 r6:85965780 r5:85cc8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee251fb0 to 0xee251ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915080 INFO: task kworker/1:824:8014 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a1bcf000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:825:8015 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:825 state:D stack:0 pid:8015 tgid:8015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee255d84 r8:00000002 r7:60000113 r6:ee255d8c r5:85cc9800 r4:85cc9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cc9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee255e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859151c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cc9800 r7:00000000 r6:83018200 r5:00001000 r4:7f82f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed82b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8538c r4:85c85000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8538c r4:85834e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cc9800 r8:85834e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834e00 r8:8027ed34 r7:ee241e60 r6:85965800 r5:85cc9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee255fb0 to 0xee255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915080 INFO: task kworker/1:825:8015 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a1bcf000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:826:8018 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:826 state:D stack:0 pid:8018 tgid:8018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee261d84 r8:00000002 r7:60000013 r6:ee261d8c r5:85cc8000 r4:85cc8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cc8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee261e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cc8000 r7:00000000 r6:83018200 r5:00001000 r4:7f915000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c85f8c r4:85c85c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c85f8c r4:85834e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cc8000 r8:85834eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834e80 r8:8027ed34 r7:ee255e60 r6:85965880 r5:85cc8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee261fb0 to 0xee261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915180 INFO: task kworker/1:826:8018 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a22fb000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:827:8019 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:827 state:D stack:0 pid:8019 tgid:8019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee265d84 r8:00000002 r7:60000013 r6:ee265d8c r5:85ccbc00 r4:85ccbc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ccbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee265e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ccbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f831000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9f3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8578c r4:85c85400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8578c r4:85834f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ccbc00 r8:85834f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834f00 r8:8027ed34 r7:ee261e60 r6:85965900 r5:85ccbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee265fb0 to 0xee265ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915180 INFO: task kworker/1:827:8019 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a2884000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:828:8020 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:828 state:D stack:0 pid:8020 tgid:8020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee221d84 r8:00000002 r7:60000013 r6:ee221d8c r5:850ab000 r4:850ab000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850ab000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee221e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f84f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edaad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c85b8c r4:85c85800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c85b8c r4:85834f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ab000 r8:85834fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834f80 r8:8027ed34 r7:ee261e60 r6:85979000 r5:850ab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee221fb0 to 0xee221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859152c0 INFO: task kworker/1:828:8020 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a2d8b000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:829:8024 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:829 state:D stack:0 pid:8024 tgid:8024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee269d84 r8:00000002 r7:60000113 r6:ee269d8c r5:850ac800 r4:850ac800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850ac800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee269e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859157c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f917000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edde3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8638c r4:85c86000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8638c r4:85979080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ac800 r8:859790ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979080 r8:8027ed34 r7:ee261e60 r6:85979100 r5:850ac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee269fb0 to 0xee269ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915580 INFO: task kworker/1:829:8024 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a30f9000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:830:8026 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:830 state:D stack:0 pid:8026 tgid:8026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee25dd84 r8:00000002 r7:60000113 r6:ee25dd8c r5:850ad400 r4:850ad400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850ad400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee25de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f919000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede01000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8678c r4:85c86400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8678c r4:85979180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ad400 r8:859791ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979180 r8:8027ed34 r7:ee269e60 r6:85979200 r5:850ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee25dfb0 to 0xee25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915780 INFO: task kworker/1:830:8026 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a387a000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:831:8027 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:831 state:D stack:0 pid:8027 tgid:8027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee26dd84 r8:00000002 r7:60000113 r6:ee26dd8c r5:850ae000 r4:850ae000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850ae000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee26de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f921000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee01b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c86f8c r4:85c86c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c86f8c r4:85979280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ae000 r8:859792ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979280 r8:8027ed34 r7:ee25de60 r6:85979300 r5:850ae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee26dfb0 to 0xee26dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859158c0 INFO: task kworker/1:831:8027 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a3aa3000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:832:8032 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:832 state:D stack:0 pid:8032 tgid:8032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee279d84 r8:00000002 r7:60000013 r6:ee279d8c r5:850aec00 r4:850aec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850aec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee279e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f91f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edfe7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c86b8c r4:85c86800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c86b8c r4:85979380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850aec00 r8:859793ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979380 r8:8027ed34 r7:ee26de60 r6:85979400 r5:850aec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee279fb0 to 0xee279ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915b80 INFO: task kworker/1:832:8032 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a4370000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:833:8034 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:833 state:D stack:0 pid:8034 tgid:8034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee27dd84 r8:00000002 r7:60000013 r6:ee27dd8c r5:8507ec00 r4:8507ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8507ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee27de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f923000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee02f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8738c r4:85c87000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8738c r4:85979480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507ec00 r8:859794ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979480 r8:8027ed34 r7:ee26de60 r6:85979500 r5:8507ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee27dfb0 to 0xee27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915e40 INFO: task kworker/1:833:8034 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a4a8c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:834:8036 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:834 state:D stack:0 pid:8036 tgid:8036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee249d84 r8:00000002 r7:60000013 r6:ee249d8c r5:85ccb000 r4:85ccb000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ccb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee249e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ccb000 r7:00000000 r6:83018200 r5:00001000 r4:7f925000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee045000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8778c r4:85c87400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8778c r4:85979580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ccb000 r8:859795ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979580 r8:8027ed34 r7:ee27de60 r6:85965980 r5:85ccb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee249fb0 to 0xee249ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915a00 INFO: task kworker/1:834:8036 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a4a8c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:835:8038 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:835 state:D stack:0 pid:8038 tgid:8038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee271d84 r8:00000002 r7:60000013 r6:ee271d8c r5:85ccd400 r4:85ccd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ccd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee271e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ccd400 r7:00000000 r6:83018200 r5:00001000 r4:7f927000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee055000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c87b8c r4:85c87800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c87b8c r4:85979600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ccd400 r8:8597962c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979600 r8:8027ed34 r7:ee249e60 r6:85965a00 r5:85ccd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee271fb0 to 0xee271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918080 INFO: task kworker/1:835:8038 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a4ccd000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:836:8040 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:836 state:D stack:0 pid:8040 tgid:8040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee285d84 r8:00000002 r7:60000013 r6:ee285d8c r5:85cce000 r4:85cce000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cce000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee285e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cce000 r7:00000000 r6:83018200 r5:00001000 r4:7f92b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee093000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c87f8c r4:85c87c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c87f8c r4:85979680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cce000 r8:859796ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979680 r8:8027ed34 r7:ee271e60 r6:85965a80 r5:85cce000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee285fb0 to 0xee285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918100 INFO: task kworker/1:836:8040 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a4ccd000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:837:8043 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:837 state:D stack:0 pid:8043 tgid:8043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee275d84 r8:00000002 r7:60000113 r6:ee275d8c r5:85ccec00 r4:85ccec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ccec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee275e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ccec00 r7:00000000 r6:83018200 r5:00001000 r4:7f92d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8c38c r4:85c8c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8c38c r4:85979700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ccec00 r8:8597972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979700 r8:8027ed34 r7:ee285e60 r6:85965b00 r5:85ccec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee275fb0 to 0xee275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859182c0 INFO: task kworker/1:837:8043 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a5795000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:838:8045 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:838 state:D stack:0 pid:8045 tgid:8045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee28dd84 r8:00000002 r7:60000013 r6:ee28dd8c r5:85ccc800 r4:85ccc800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ccc800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee28de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ccc800 r7:00000000 r6:83018200 r5:00001000 r4:7f92f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee289000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8c78c r4:85c8c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8c78c r4:85979780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ccc800 r8:859797ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979780 r8:8027ed34 r7:ee275e60 r6:85965b80 r5:85ccc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee28dfb0 to 0xee28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918280 INFO: task kworker/1:838:8045 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a5bc7000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:839:8047 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:839 state:D stack:0 pid:8047 tgid:8047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee295d84 r8:00000002 r7:60000113 r6:ee295d8c r5:85cca400 r4:85cca400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cca400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee295e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cca400 r7:00000000 r6:83018200 r5:00001000 r4:7f935000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8d38c r4:85c8d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8d38c r4:85979800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cca400 r8:8597982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979800 r8:8027ed34 r7:ee28de60 r6:85965c00 r5:85cca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee295fb0 to 0xee295ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859185c0 INFO: task kworker/1:839:8047 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a5fe9000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:840:8049 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:840 state:D stack:0 pid:8049 tgid:8049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2a1d84 r8:00000002 r7:60000113 r6:ee2a1d8c r5:8588b000 r4:8588b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8588b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859186c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8588b000 r7:00000000 r6:83018200 r5:00001000 r4:7f931000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee297000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8cb8c r4:85c8c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8cb8c r4:85979880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8588b000 r8:859798ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979880 r8:8027ed34 r7:ee295e60 r6:85965c80 r5:8588b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2a1fb0 to 0xee2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918600 INFO: task kworker/1:840:8049 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a6650000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:841:8051 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:841 state:D stack:0 pid:8051 tgid:8051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2a9d84 r8:00000002 r7:60000113 r6:ee2a9d8c r5:84528000 r4:84528000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84528000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2a9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84528000 r7:00000000 r6:83018200 r5:00001000 r4:7f933000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee29d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8cf8c r4:85c8cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8cf8c r4:85979900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84528000 r8:8597992c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979900 r8:8027ed34 r7:ee295e60 r6:85965d00 r5:84528000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2a9fb0 to 0xee2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918840 INFO: task kworker/1:841:8051 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a6650000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:842:8053 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:842 state:D stack:0 pid:8053 tgid:8053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2b5d84 r8:00000002 r7:60000013 r6:ee2b5d8c r5:84528c00 r4:84528c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84528c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2b5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84528c00 r7:00000000 r6:83018200 r5:00001000 r4:7f937000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2b1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8d78c r4:85c8d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8d78c r4:85979980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84528c00 r8:859799ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979980 r8:8027ed34 r7:ee295e60 r6:85965d80 r5:84528c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2b5fb0 to 0xee2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918880 INFO: task kworker/1:842:8053 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a6b15000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:843:8055 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:843 state:D stack:0 pid:8055 tgid:8055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2c9d84 r8:00000002 r7:60000113 r6:ee2c9d8c r5:8452a400 r4:8452a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2c9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452a400 r7:00000000 r6:83018200 r5:00001000 r4:7f93b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2c5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8df8c r4:85c8dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8df8c r4:85979a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452a400 r8:85979a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979a00 r8:8027ed34 r7:ee2b5e60 r6:85965e00 r5:8452a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2c9fb0 to 0xee2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918ac0 INFO: task kworker/1:843:8055 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a6b15000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:844:8058 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:844 state:D stack:0 pid:8058 tgid:8058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2d9d84 r8:00000002 r7:60000113 r6:ee2d9d8c r5:84529800 r4:84529800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84529800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2d9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84529800 r7:00000000 r6:83018200 r5:00001000 r4:7f939000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2bf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8db8c r4:85c8d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8db8c r4:85979a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84529800 r8:85979aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979a80 r8:8027ed34 r7:ee2c9e60 r6:85965e80 r5:84529800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2d9fb0 to 0xee2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918dc0 INFO: task kworker/1:844:8058 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a71b1000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:845:8059 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:845 state:D stack:0 pid:8059 tgid:8059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2ddd84 r8:00000002 r7:60000113 r6:ee2ddd8c r5:8452c800 r4:8452c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2dde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab47c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452c800 r7:00000000 r6:83018200 r5:00001000 r4:7f901000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee243000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ce538c r4:85ce5000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ce538c r4:85979b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452c800 r8:85979b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979b00 r8:8027ed34 r7:ee2c9e60 r6:85965f00 r5:8452c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2ddfb0 to 0xee2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918dc0 INFO: task kworker/1:845:8059 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a71b1000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:846:8060 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:846 state:D stack:0 pid:8060 tgid:8060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2e1d84 r8:00000002 r7:60000113 r6:ee2e1d8c r5:8452d400 r4:8452d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2e1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452d400 r7:00000000 r6:83018200 r5:00001000 r4:7f93d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2e3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8e38c r4:85c8e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8e38c r4:85979b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452d400 r8:85979bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979b80 r8:8027ed34 r7:ee2dde60 r6:85965f80 r5:8452d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2e1fb0 to 0xee2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918dc0 INFO: task kworker/1:846:8060 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a767a000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:847:8063 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:847 state:D stack:0 pid:8063 tgid:8063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2f9d84 r8:00000002 r7:60000113 r6:ee2f9d8c r5:8452bc00 r4:8452bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2f9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab4040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f93f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2e9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8e78c r4:85c8e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8e78c r4:85979c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452bc00 r8:85979c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979c00 r8:8027ed34 r7:ee2dde60 r6:85ac0000 r5:8452bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2f9fb0 to 0xee2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab40c0 INFO: task kworker/1:847:8063 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a767a000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:848:8065 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:848 state:D stack:0 pid:8065 tgid:8065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee309d84 r8:00000002 r7:60000113 r6:ee309d8c r5:8452b000 r4:8452b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee309e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab41c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452b000 r7:00000000 r6:83018200 r5:00001000 r4:7f941000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2fb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8eb8c r4:85c8e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8eb8c r4:85979c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452b000 r8:85979cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979c80 r8:8027ed34 r7:ee2dde60 r6:85ac0080 r5:8452b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee309fb0 to 0xee309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab40c0 INFO: task kworker/1:848:8065 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a7b4d000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:849:8066 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:849 state:D stack:0 pid:8066 tgid:8066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee311d84 r8:00000002 r7:60000113 r6:ee311d8c r5:8452e000 r4:8452e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee311e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab42c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452e000 r7:00000000 r6:83018200 r5:00001000 r4:7f943000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee301000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8ef8c r4:85c8ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8ef8c r4:85979d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452e000 r8:85979d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979d00 r8:8027ed34 r7:ee2dde60 r6:85ac0100 r5:8452e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee311fb0 to 0xee311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab4400 INFO: task kworker/1:849:8066 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a7b4d000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:850:8068 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:850 state:D stack:0 pid:8068 tgid:8068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee319d84 r8:00000002 r7:60000113 r6:ee319d8c r5:85cf0c00 r4:85cf0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee319e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab4480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f945000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee31b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8f38c r4:85c8f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8f38c r4:85979d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf0c00 r8:85979dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979d80 r8:8027ed34 r7:ee2dde60 r6:85ac0180 r5:85cf0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee319fb0 to 0xee319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab4240 INFO: task kworker/1:850:8068 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a8690000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:851:8070 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:851 state:D stack:0 pid:8070 tgid:8070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee329d84 r8:00000002 r7:60000013 r6:ee329d8c r5:85cf2400 r4:85cf2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee329e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab4540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf2400 r7:00000000 r6:83018200 r5:00001000 r4:7f947000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee321000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8f78c r4:85c8f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8f78c r4:85979e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf2400 r8:85979e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979e00 r8:8027ed34 r7:ee2dde60 r6:85ac0200 r5:85cf2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee329fb0 to 0xee329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab4440 INFO: task kworker/1:851:8070 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a8690000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:852:8073 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:852 state:D stack:0 pid:8073 tgid:8073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee341d84 r8:00000002 r7:60000113 r6:ee341d8c r5:85cf3c00 r4:85cf3c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee341e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab46c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f949000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee333000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8fb8c r4:85c8f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8fb8c r4:85979e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf3c00 r8:85979eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979e80 r8:8027ed34 r7:ee2dde60 r6:85ac0280 r5:85cf3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee341fb0 to 0xee341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab4580 INFO: task kworker/1:852:8073 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a8c04000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:853:8103 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:853 state:D stack:0 pid:8103 tgid:8103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee281d84 r8:00000002 r7:60000013 r6:ee281d8c r5:85cf5400 r4:85cf5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee281e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f4040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf5400 r7:00000000 r6:83018200 r5:00001000 r4:7f903000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee373000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8ff8c r4:85c8fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8ff8c r4:85979f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf5400 r8:85979f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979f00 r8:8027ed34 r7:ee2dde60 r6:85ac0300 r5:85cf5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee281fb0 to 0xee281ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab4580 INFO: task kworker/1:853:8103 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a8c04000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:854:8105 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:854 state:D stack:0 pid:8105 tgid:8105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee37dd84 r8:00000002 r7:60000113 r6:ee37dd8c r5:85cf3000 r4:85cf3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee37de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f4840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf3000 r7:00000000 r6:83018200 r5:00001000 r4:7f951000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf89000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d3038c r4:85d30000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d3038c r4:85979f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf3000 r8:85979fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979f80 r8:8027ed34 r7:ee281e60 r6:85ac0380 r5:85cf3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee37dfb0 to 0xee37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f4080 INFO: task kworker/1:854:8105 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a91bc000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:855:8149 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:855 state:D stack:0 pid:8149 tgid:8149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee33dd84 r8:00000002 r7:60000113 r6:ee33dd8c r5:85cf6000 r4:85cf6000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee33de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598b040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf6000 r7:00000000 r6:83018200 r5:00001000 r4:7faa5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee6d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d96b8c r4:85d96800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d96b8c r4:85cb4000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf6000 r8:85cb402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85cb4000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cb4000 r8:8027ed34 r7:ee37de60 r6:85ac0400 r5:85cf6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee33dfb0 to 0xee33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f4f40 INFO: task kworker/1:855:8149 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a91bc000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:856:8327 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:856 state:D stack:0 pid:8327 tgid:8327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee4b1d84 r8:00000002 r7:60000013 r6:ee4b1d8c r5:85cf0000 r4:85cf0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee4b1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dcfb00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf0000 r7:00000000 r6:83018200 r5:00001000 r4:7fb0d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee525000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d3138c r4:85d31000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d3138c r4:85cb4080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf0000 r8:85cb40ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85cb4080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cb4080 r8:8027ed34 r7:ee33de60 r6:85ac0480 r5:85cf0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee4b1fb0 to 0xee4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8598b480 INFO: task kworker/1:856:8327 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a91bc000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:857:8383 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:857 state:D stack:0 pid:8383 tgid:8383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee791d84 r8:00000002 r7:60000113 r6:ee791d8c r5:85cf6c00 r4:85cf6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee791e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dcf980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf6c00 r7:00000000 r6:83018200 r5:00001000 r4:7fb0f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee535000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d3178c r4:85d31400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d3178c r4:85cb4100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf6c00 r8:85cb412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85cb4100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cb4100 r8:8027ed34 r7:ee4b1e60 r6:85ac0500 r5:85cf6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee791fb0 to 0xee791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85dcfd00 INFO: task kworker/1:857:8383 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a9873000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:858:8384 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:858 state:D stack:0 pid:8384 tgid:8384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee795d84 r8:00000002 r7:60000113 r6:ee795d8c r5:8452ec00 r4:8452ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee795e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dcf2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452ec00 r7:00000000 r6:83018200 r5:00001000 r4:7fb23000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee703000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d31b8c r4:85d31800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d31b8c r4:85cb4180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452ec00 r8:85cb41ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85cb4180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cb4180 r8:8027ed34 r7:ee791e60 r6:85ac0580 r5:8452ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee795fb0 to 0xee795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85dcf8c0 INFO: task kworker/1:858:8384 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a9f2e000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:859:8385 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:859 state:D stack:0 pid:8385 tgid:8385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee4f1d84 r8:00000002 r7:60000113 r6:ee4f1d8c r5:8507b000 r4:8507b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8507b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee4f1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85df0640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507b000 r7:00000000 r6:83018200 r5:00001000 r4:7fb11000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee54d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85da438c r4:85da4000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85da438c r4:85cb4200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507b000 r8:85cb422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85cb4200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cb4200 r8:8027ed34 r7:ee795e60 r6:85cb4280 r5:8507b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee4f1fb0 to 0xee4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85dcf8c0 INFO: task kworker/1:859:8385 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a9f2e000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000f0013 r5:600f0093 r4:8225e9d4 [<80201ae4>] (show_stack) from [<8021fdc4>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ae4>] (show_stack) from [<8021fdc4>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fd54>] (dump_stack_lvl) from [<8021fde8>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021fdd0>] (dump_stack) from [<81a49bb8>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a49a58>] (nmi_cpu_backtrace) from [<81a49d04>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281afc0 r4:ffffffff [<81a49bd4>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8280c80c r8:82ab5564 r7:8281bba8 r6:000077e4 r5:8281b588 r4:85d4820c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380b44>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380b44>] (check_hung_uninterruptible_tasks kernel/hung_task.c:307 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380b44>] (watchdog+0x4a8/0x74c kernel/hung_task.c:470) [<8038069c>] (watchdog) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8038069c r7:83349780 r6:83349780 r5:83259800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8334c580 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2815 Comm: pr/ttyAMA0 Not tainted 6.15.0-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a69194>] lr : [<80a6c958>] psr: 60070113 sp : ebea1eb0 ip : ebea1ec0 fp : ebea1ebc r10: 8295a64c r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 8295a5b0 r5 : 00000000 r4 : 00000001 r3 : 0000e877 r2 : 00000000 r1 : 60070113 r0 : 84499040 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 846d0bc0 DAC: 00000000 Call trace: [<81a6916c>] (_raw_spin_unlock_irqrestore) from [<80a6c958>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6916c>] (_raw_spin_unlock_irqrestore) from [<80a6c958>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a6916c>] (_raw_spin_unlock_irqrestore) from [<80a6c958>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a6c938>] (pl011_console_device_unlock) from [<802e7e6c>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802e7dec>] (nbcon_emit_one) from [<802e808c>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c690 r5:83ae0000 r4:8295a5b0 [<802e7ee4>] (nbcon_kthread_func) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295a5b0 r8:802e7ee4 r7:83971800 r6:83971800 r5:83ae0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebea1fb0 to 0xebea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8389cd00