Extracting prog: 5m30.928405725s Minimizing prog: 1h18m26.726763165s Simplifying prog options: 0s Extracting C: 8m37.2772593s Simplifying C: 58m30.6527335s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-fremovexattr detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) fremovexattr(0xffffffffffffffff, 0x0) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-fremovexattr detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) fremovexattr(0xffffffffffffffff, 0x0) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 3 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) program crashed: lost connection to test machine testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 2h31m5.585196289s repro crashed as (corrupted=false): INFO: task kworker/0:1:11 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df845d84 r8:00000002 r7:60000013 r6:df845d8c r5:83240000 r4:83240000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83240000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df845e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83240000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb09000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579238c r4:85792000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579238c r4:830b8580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240000 r8:830b85ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8580 r8:8027ed34 r7:df83de60 r6:830b8680 r5:83240000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf845fb0 to 0xdf845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830b7900 INFO: task kworker/0:1:11 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b3513000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/0:0:3092 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3092 tgid:3092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9d5d84 r8:00000002 r7:60000013 r6:df9d5d8c r5:839f8000 r4:839f8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:839f8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:839f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebda3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85793b8c r4:85793800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85793b8c r4:830b8480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839f8000 r8:830b84ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:8027ed34 r7:df911e60 r6:8473a100 r5:839f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499ca00 INFO: task kworker/0:0:3092 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b378b000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/0:6:3126 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9e1d84 r8:00000002 r7:60000013 r6:df9e1d8c r5:8400bc00 r4:8400bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8400bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8400bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb33000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579278c r4:85792400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579278c r4:830b8700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8400bc00 r8:830b872c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8700 r8:8027ed34 r7:df98de60 r6:832a1180 r5:8400bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84987b80 INFO: task kworker/0:6:3126 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b3ba1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/0:7:3128 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9fdd84 r8:00000002 r7:60000013 r6:df9fdd8c r5:8400d400 r4:8400d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8400d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474bf00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8400d400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac11000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bef8c r4:852bec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852bef8c r4:83971a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8400d400 r8:83971a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:83971a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83971a00 r8:8027ed34 r7:df9e1e60 r6:8473d000 r5:8400d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84987b80 INFO: task kworker/0:7:3128 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b3ba1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/1:12:3140 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:83a08000 r4:83a08000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a08000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b74540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a08000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac39000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a438c r4:852a4000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a438c r4:8473d580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a08000 r8:8473d5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473d580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d580 r8:8027ed34 r7:dfa21e60 r6:8473d600 r5:83a08000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84983e80 INFO: task kworker/1:12:3140 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b3f4a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/1:13:3142 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:83a0d400 r4:83a0d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a0d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e1040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a0d400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac0f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844b8b8c r4:844b8800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844b8b8c r4:8473d680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a0d400 r8:8473d6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473d680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d680 r8:8027ed34 r7:dfa2de60 r6:8473d700 r5:83a0d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777080 INFO: task kworker/1:13:3142 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b42bd000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/1:14:3143 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:83a0b000 r4:83a0b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a0b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525e240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a0b000 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514f78c r4:8514f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514f78c r4:8473d780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a0b000 r8:8473d7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473d780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d780 r8:8027ed34 r7:dfa35e60 r6:8473d800 r5:83a0b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777080 INFO: task kworker/1:14:3143 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b458e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/1:15:3146 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:840f1800 r4:840f1800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b7000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcff000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e838c r4:847e8000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e838c r4:8473d880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f1800 r8:8473d8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473d880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d880 r8:8027ed34 r7:dfa35e60 r6:8473d900 r5:840f1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777300 INFO: task kworker/1:15:3146 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b4693000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/1:16:3148 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa51d84 r8:00000002 r7:60000013 r6:dfa51d8c r5:840f5400 r4:840f5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126080 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa53000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e938c r4:847e9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e938c r4:8473d980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f5400 r8:8473d9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473d980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d980 r8:8027ed34 r7:dfa49e60 r6:8473da00 r5:840f5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa51fb0 to 0xdfa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777480 INFO: task kworker/1:16:3148 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b4a09000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 INFO: task kworker/1:17:3149 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:840f3000 r4:840f3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85358d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1eb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85316f8c r4:85316c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85316f8c r4:8473da80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f3000 r8:8473daac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473da80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473da80 r8:8027ed34 r7:dfa51e60 r6:8473db00 r5:840f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777700 INFO: task kworker/1:17:3149 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b5278000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3152 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:840f2400 r4:840f2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535b700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa81000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854da78c r4:854da400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854da78c r4:84206380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f2400 r8:842063ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84206380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84206380 r8:8027ed34 r7:df9e1e60 r6:8473db80 r5:840f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84987680 INFO: task kworker/0:8:3152 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b57fa000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3153 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:840f6c00 r4:840f6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85490cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541ff8c r4:8541fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541ff8c r4:8473dc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f6c00 r8:8473dc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473dc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473dc00 r8:8027ed34 r7:dfa51e60 r6:8473dc80 r5:840f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847779c0 INFO: task kworker/1:18:3153 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b5d77000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3155 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:840f0000 r4:840f0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c3ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac59000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531778c r4:85317400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8531778c r4:8473dd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f0000 r8:8473dd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473dd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473dd00 r8:8027ed34 r7:dfa51e60 r6:8473dd80 r5:840f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777d80 INFO: task kworker/1:19:3155 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b5f9a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3158 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:840f4800 r4:840f4800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560bcc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3bf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546e78c r4:8546e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546e78c r4:8473de00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f4800 r8:8473de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473de00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473de00 r8:8027ed34 r7:dfa51e60 r6:8473de80 r5:840f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84777e00 INFO: task kworker/1:20:3158 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b60dc000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3160 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:840f0c00 r4:840f0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858199c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85792b8c r4:85792800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85792b8c r4:83374000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f0c00 r8:8337402c r7:82804d40 r6:dddced40 r5:dddced60 r4:83374000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83374000 r8:8027ed34 r7:df9e1e60 r6:8473df00 r5:840f0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84987e40 INFO: task kworker/0:9:3160 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b635a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3162 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:83ffa400 r4:83ffa400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffa400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85537f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ffa400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb327000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546df8c r4:8546dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546df8c r4:8473df80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffa400 r8:8473dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8473df80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473df80 r8:8027ed34 r7:dfa99e60 r6:8470b000 r5:83ffa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ae0c0 INFO: task kworker/1:21:3162 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b6495000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3164 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:83ff8000 r4:83ff8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ff8000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a5b8c r4:856a5800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a5b8c r4:8470b080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff8000 r8:8470b0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b080 r8:8027ed34 r7:dfa99e60 r6:8470b100 r5:83ff8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ae340 INFO: task kworker/1:22:3164 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b68ed000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3167 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa85d84 r8:00000002 r7:60000013 r6:dfa85d8c r5:83ffe000 r4:83ffe000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffe000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7f5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ffe000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb703000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546f78c r4:8546f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546f78c r4:8470b180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffe000 r8:8470b1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b180 r8:8027ed34 r7:dfaa1e60 r6:8470b200 r5:83ffe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ae400 INFO: task kworker/1:23:3167 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b6a66000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3168 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa5dd84 r8:00000002 r7:60000013 r6:dfa5dd8c r5:83ffd400 r4:83ffd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471e780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ffd400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546fb8c r4:8546f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546fb8c r4:8470b280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffd400 r8:8470b2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b280 r8:8027ed34 r7:dfaa1e60 r6:8470b300 r5:83ffd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ae540 INFO: task kworker/1:24:3168 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b6c99000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfac5d84 r8:00000002 r7:60000113 r6:dfac5d8c r5:83ff8c00 r4:83ff8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ed600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ff8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe69000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577e78c r4:8577e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577e78c r4:8470b380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff8c00 r8:8470b3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b380 r8:8027ed34 r7:dfaa1e60 r6:8470b400 r5:83ff8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac5fb0 to 0xdfac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ae6c0 INFO: task kworker/1:25:3170 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b6cfe000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3171 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:83ff9800 r4:83ff9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aea40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ff9800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5bb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a738c r4:856a7000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a738c r4:8470b480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff9800 r8:8470b4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b480 r8:8027ed34 r7:dfac5e60 r6:8470b500 r5:83ff9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847aea40 INFO: task kworker/1:26:3171 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b6ede000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:83ffbc00 r4:83ffbc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85817980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ffbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576078c r4:85760400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576078c r4:8470b580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffbc00 r8:8470b5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b580 r8:8027ed34 r7:dfad9e60 r6:8470b600 r5:83ffbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847aeb80 INFO: task kworker/1:27:3174 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b7046000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3176 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:83ffc800 r4:83ffc800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffc800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85803000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ffc800 r7:00000000 r6:83018200 r5:00001000 r4:7f105000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f338c r4:847f3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f338c r4:8470b680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffc800 r8:8470b6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b680 r8:8027ed34 r7:dfadde60 r6:8470b700 r5:83ffc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ae9c0 INFO: task kworker/1:28:3176 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b77ac000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3178 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:840f3c00 r4:840f3c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84adf000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f101000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec955000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f078c r4:847f0400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f078c r4:8470b780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f3c00 r8:8470b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b780 r8:8027ed34 r7:dfae1e60 r6:8470b800 r5:840f3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977100 INFO: task kworker/1:29:3178 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b77ac000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3180 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:83b59800 r4:83b59800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b59800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85817840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b59800 r7:00000000 r6:83018200 r5:00001000 r4:7f103000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec971000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f1b8c r4:847f1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f1b8c r4:8470b880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b59800 r8:8470b8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470b880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470b880 r8:8027ed34 r7:dfad1e60 r6:8470b900 r5:83b59800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977100 INFO: task kworker/1:30:3180 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b79e5000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3182 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:83b5bc00 r4:83b5bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b5bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b5bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ff000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85763f8c r4:85763c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85763f8c r4:8470ba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b5bc00 r8:8470ba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470ba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470ba00 r8:8027ed34 r7:dfad1e60 r6:8470ba80 r5:83b5bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977580 INFO: task kworker/1:31:3182 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b7d7c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3184 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:83b5d400 r4:83b5d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b5d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bc00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b5d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0f7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec855000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85762f8c r4:85762c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85762f8c r4:8470bb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b5d400 r8:8470bb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470bb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470bb00 r8:8027ed34 r7:dfae9e60 r6:8470bb80 r5:83b5d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849772c0 INFO: task kworker/1:32:3184 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b7f01000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3185 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:83b58000 r4:83b58000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b58000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b58000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ed000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85761b8c r4:85761800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85761b8c r4:8470bc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b58000 r8:8470bc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470bc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470bc00 r8:8027ed34 r7:dfaf1e60 r6:8470bc80 r5:83b58000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849775c0 INFO: task kworker/1:33:3185 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b7f01000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:84272400 r4:84272400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84272400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bdc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84272400 r7:00000000 r6:83018200 r5:00001000 r4:7f0fb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec895000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576378c r4:85763400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576378c r4:8470bd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84272400 r8:8470bd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470bd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470bd00 r8:8027ed34 r7:dfaf1e60 r6:83374080 r5:84272400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977880 INFO: task kworker/1:34:3188 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b863d000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3190 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:83b44800 r4:83b44800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b44800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b44800 r7:00000000 r6:83018200 r5:00001000 r4:7f0fd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec939000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85763b8c r4:85763800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85763b8c r4:8470bd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b44800 r8:8470bdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470bd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470bd80 r8:8027ed34 r7:dfb11e60 r6:8473a400 r5:83b44800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb25fb0 to 0xdfb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977c40 INFO: task kworker/1:35:3190 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b863d000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:833bec00 r4:833bec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833bec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:833bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdd5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85760f8c r4:85760c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85760f8c r4:8470be00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833bec00 r8:8470be2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470be00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470be00 r8:8027ed34 r7:dfb11e60 r6:842fd100 r5:833bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977a80 INFO: task kworker/1:36:3192 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b89a3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb31d84 r8:00000002 r7:60000013 r6:dfb31d8c r5:8323e000 r4:8323e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bd00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8323e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec87d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576338c r4:85763000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576338c r4:8470be80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:8470beac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470be80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470be80 r8:8027ed34 r7:dfb29e60 r6:84728f00 r5:8323e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977d40 INFO: task kworker/1:37:3194 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b89a3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb3dd84 r8:00000002 r7:60000113 r6:dfb3dd8c r5:84546000 r4:84546000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84546000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bb00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84546000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec839000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85762b8c r4:85762800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85762b8c r4:8470bf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84546000 r8:8470bf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470bf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470bf00 r8:8027ed34 r7:dfb29e60 r6:84728e80 r5:84546000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977d40 INFO: task kworker/1:38:3196 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b91c5000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:833ad400 r4:833ad400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833ad400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581ba00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:833ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f0f3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec827000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576278c r4:85762400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576278c r4:8470bf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833ad400 r8:8470bfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8470bf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8470bf80 r8:8027ed34 r7:dfb3de60 r6:84728e00 r5:833ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977e00 INFO: task kworker/1:39:3199 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b91c5000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3200 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:83adec00 r4:83adec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83adec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83adec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ef000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85761f8c r4:85761c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85761f8c r4:84758000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adec00 r8:8475802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758000 r8:8027ed34 r7:dfb4de60 r6:84728d80 r5:83adec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84977e00 INFO: task kworker/1:40:3200 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b9711000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:83ae6000 r4:83ae6000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ae6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ae6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec817000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576238c r4:85762000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576238c r4:84758080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae6000 r8:847580ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758080 r8:8027ed34 r7:dfb51e60 r6:84728600 r5:83ae6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adf300 INFO: task kworker/1:41:3202 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: b9711000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3204 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:83ae2400 r4:83ae2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ae2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ae2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe79000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576178c r4:85761400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576178c r4:84758100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae2400 r8:8475812c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758100 r8:8027ed34 r7:dfb51e60 r6:84758180 r5:83ae2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adf080 INFO: task kworker/1:42:3204 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ba14a000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb19d84 r8:00000002 r7:60000113 r6:dfb19d8c r5:83b5b000 r4:83b5b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b5b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b5b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe55000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576138c r4:85761000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8576138c r4:84758200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b5b000 r8:8475822c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758200 r8:8027ed34 r7:dfb65e60 r6:84758280 r5:83b5b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adf0c0 INFO: task kworker/1:43:3206 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ba26d000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:83ffb000 r4:83ffb000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ff140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ffb000 r7:00000000 r6:83018200 r5:00001000 r4:7f1b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7fd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85846b8c r4:85846800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85846b8c r4:84758300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffb000 r8:8475832c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758300 r8:8027ed34 r7:dfb19e60 r6:84758380 r5:83ffb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adf440 INFO: task kworker/1:44:3208 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ba912000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3211 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:839e5400 r4:839e5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:839e5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ff000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:839e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f1b1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec795000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584678c r4:85846400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584678c r4:84758400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839e5400 r8:8475842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758400 r8:8027ed34 r7:dfb05e60 r6:84758480 r5:839e5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adf7c0 INFO: task kworker/1:45:3211 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ba912000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3213 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:83b5ec00 r4:83b5ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b5ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b5ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f1fb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb1f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85846f8c r4:85846c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85846f8c r4:84758500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b5ec00 r8:8475852c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758500 r8:8027ed34 r7:dfb89e60 r6:84758580 r5:83b5ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adfa00 INFO: task kworker/1:46:3213 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: ba912000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:83b58c00 r4:83b58c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b58c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475c700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b58c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2cf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb15000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f9b8c r4:847f9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f9b8c r4:84758600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b58c00 r8:8475862c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758600 r8:8027ed34 r7:dfb95e60 r6:84758680 r5:83b58c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adf700 INFO: task kworker/1:47:3214 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bb546000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3217 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:840e8000 r4:840e8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840e8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe5d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579438c r4:85794000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579438c r4:84728f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840e8000 r8:84728fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84728f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84728f80 r8:8027ed34 r7:df9e1e60 r6:84758780 r5:840e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84976ec0 INFO: task kworker/0:10:3217 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bb546000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbb9d84 r8:00000002 r7:60000013 r6:dfbb9d8c r5:840e8c00 r4:840e8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840e8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd59000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579338c r4:85793000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579338c r4:84728d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840e8c00 r8:84728d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84728d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84728d00 r8:8027ed34 r7:dfbb5e60 r6:84758700 r5:840e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84976ec0 INFO: task kworker/0:11:3218 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bbdfb000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3220 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:840ee000 r4:840ee000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840ee000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475c3c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f2d3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb27000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f938c r4:847f9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f938c r4:84758800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ee000 r8:8475882c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758800 r8:8027ed34 r7:dfb9de60 r6:847b1000 r5:840ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84adfe40 INFO: task kworker/1:48:3220 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bc087000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3222 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb75d84 r8:00000002 r7:60000013 r6:dfb75d8c r5:83ae3000 r4:83ae3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ae3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475c580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ae3000 r7:00000000 r6:83018200 r5:00001000 r4:7f2d1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb1d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f978c r4:847f9400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f978c r4:84758880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae3000 r8:847588ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758880 r8:8027ed34 r7:dfb9de60 r6:847b1080 r5:83ae3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c0c0 INFO: task kworker/1:49:3222 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bc087000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3226 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:83ff0c00 r4:83ff0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475c740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ff0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2cd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb09000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847f9f8c r4:847f9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847f9f8c r4:84758900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff0c00 r8:8475892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758900 r8:8027ed34 r7:dfb9de60 r6:847b1100 r5:83ff0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c1c0 INFO: task kworker/1:50:3226 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bc74e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:51:3228 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:3228 tgid:3228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbe9d84 r8:00000002 r7:60000113 r6:dfbe9d8c r5:848b8c00 r4:848b8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475c8c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2cb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecafd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fa38c r4:847fa000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fa38c r4:84758980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:847589ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758980 r8:8027ed34 r7:dfbdde60 r6:847b1180 r5:848b8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c280 INFO: task kworker/1:51:3228 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bc74e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3230 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:848ba400 r4:848ba400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ba400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475ca00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fa78c r4:847fa400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fa78c r4:84758a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84758a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758a00 r8:8027ed34 r7:dfbe9e60 r6:847b1200 r5:848ba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c400 INFO: task kworker/1:52:3230 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bcb9c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3231 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:848bb000 r4:848bb000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595ca00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f2bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca9f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584738c r4:85847000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584738c r4:84758a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bb000 r8:84758aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758a80 r8:8027ed34 r7:dfbf9e60 r6:847b1280 r5:848bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c400 INFO: task kworker/1:53:3231 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bcb9c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3233 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:848b8000 r4:848b8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475ca80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f2c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca5f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fab8c r4:847fa800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fab8c r4:84758b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8000 r8:84758b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758b00 r8:8027ed34 r7:dfc01e60 r6:847b1300 r5:848b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c400 INFO: task kworker/1:54:3233 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bd3c1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3234 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:848b9800 r4:848b9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595c2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f2c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca25000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85847f8c r4:85847c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85847f8c r4:84758b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b9800 r8:84758bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758b80 r8:8027ed34 r7:dfc01e60 r6:847b1380 r5:848b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c6c0 INFO: task kworker/1:55:3234 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bd3c1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3237 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc25d84 r8:00000002 r7:60000113 r6:dfc25d8c r5:848be000 r4:848be000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848be000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595c500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848be000 r7:00000000 r6:83018200 r5:00001000 r4:7f2c3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85847b8c r4:85847800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85847b8c r4:84758c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848be000 r8:84758c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758c00 r8:8027ed34 r7:dfc01e60 r6:847b1400 r5:848be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c7c0 INFO: task kworker/1:56:3237 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bd3c1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:3239 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc35d84 r8:00000002 r7:60000113 r6:dfc35d8c r5:848bc800 r4:848bc800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bc800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595c7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f2c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584778c r4:85847400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8584778c r4:84758c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bc800 r8:84758cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758c80 r8:8027ed34 r7:dfc01e60 r6:847b1480 r5:848bc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475c940 INFO: task kworker/1:57:3239 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bd3c1000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:3240 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc3dd84 r8:00000002 r7:60000013 r6:dfc3dd8c r5:848bd400 r4:848bd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f2040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f3f7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fc38c r4:847fc000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fc38c r4:84758d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bd400 r8:84758d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758d00 r8:8027ed34 r7:dfc35e60 r6:847b1500 r5:848bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475cb40 INFO: task kworker/1:58:3240 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bd934000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:59:3242 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:59 state:D stack:0 pid:3242 tgid:3242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc31d84 r8:00000002 r7:60000013 r6:dfc31d8c r5:840eb000 r4:840eb000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840eb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b4f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc0b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858cbf8c r4:858cbc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858cbf8c r4:84758d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840eb000 r8:84758dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758d80 r8:8027ed34 r7:dfc3de60 r6:84758e00 r5:840eb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475cb40 INFO: task kworker/1:59:3242 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bd934000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3243 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:848bec00 r4:848bec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe3b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85793f8c r4:85793c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85793f8c r4:847b1580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bec00 r8:847b15ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847b1580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b1580 r8:8027ed34 r7:dfbb5e60 r6:847b1600 r5:848bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481c940 INFO: task kworker/0:12:3243 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bdfcf000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:3247 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:839e1800 r4:839e1800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:839e1800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b49c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:839e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f3f5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf99000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fc78c r4:847fc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fc78c r4:84758e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839e1800 r8:84758eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758e80 r8:8027ed34 r7:dfc3de60 r6:847b1680 r5:839e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8475cec0 INFO: task kworker/1:60:3247 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bdfcf000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3249 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc4dd84 r8:00000002 r7:60000013 r6:dfc4dd8c r5:83ff0000 r4:83ff0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481e2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ff0000 r7:00000000 r6:83018200 r5:00001000 r4:7f3f1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd39000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fcf8c r4:847fcc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fcf8c r4:84758f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff0000 r8:84758f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758f00 r8:8027ed34 r7:dfc49e60 r6:847b1700 r5:83ff0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84976180 INFO: task kworker/1:61:3249 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: be1ad000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:62:3250 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:62 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc51d84 r8:00000002 r7:60000013 r6:dfc51d8c r5:83240c00 r4:83240c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83240c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481e300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83240c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3f3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf83000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fcb8c r4:847fc800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fcb8c r4:84758f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240c00 r8:84758fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84758f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84758f80 r8:8027ed34 r7:dfc4de60 r6:847b1780 r5:83240c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847aef40 INFO: task kworker/1:62:3250 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: be6e4000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84719340 r5:84aa0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:847fd78c r4:847fd400 r10:00000000 r9:8474d000 r8:8027ed34 r7:dfc4de60 r6:847b1800 r5:84aa0000 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaeb5dc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84aa1800 r5:84aa1800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:84aa1800 r7:00000000 r6:83018200 r5:00001000 r4:7f3ef000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa5f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fd38c r4:847fd000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fd38c r4:8474d080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa1800 r8:8474d0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d080 r8:8027ed34 r7:dfc55e60 r6:847b1880 r5:84aa1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481e040 INFO: task kworker/1:64:3255 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bea9c000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r5:84aa2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Call trace: 5d60: 800f0013 ffffffff r4:eaeb5dc0 r4:00000000 r5:8524af8c r4:8524ac00 r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:66:3258 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:66 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:84aa3000 r4:84aa3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aa3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481e800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aa3000 r7:00000000 r6:83018200 r5:00001000 r4:7f3eb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf13000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fdb8c r4:847fd800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fdb8c r4:8474d180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa3000 r8:8474d1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d180 r8:8027ed34 r7:dfc61e60 r6:847b1980 r5:84aa3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bf650000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:67:3261 blocked for more than 452 seconds. r4:84aa3c00 r5:84aa3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r5:00001000 r4:eadb5000 r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84aa4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc6de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f2240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aa4800 r7:00000000 r6:83018200 r5:00001000 r4:7f3e5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb31000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fbb8c r4:847fb800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fbb8c r4:8474d280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa4800 r8:8474d2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d280 r8:8027ed34 r7:dfc69e60 r6:847b1a80 r5:84aa4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc6dfb0 to 0xdfc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481e5c0 INFO: task kworker/1:68:3263 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bfc08000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:69:3265 blocked for more than 452 seconds. [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84aa5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f2500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aa5400 r7:00000000 r6:83018200 r5:00001000 r4:7f3e3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fbf8c r4:847fbc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847fbf8c r4:8474d300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa5400 r8:8474d32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d300 r8:8027ed34 r7:dfc6de60 r6:847b1b00 r5:84aa5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481ea00 INFO: task kworker/1:69:3265 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: bffe3000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84aa6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r5:00001000 r4:ed509000 r10:61c88647 r9:84aa6000 r8:8474d3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaeb5d20 to 0xeaeb5d68) r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:71:3270 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:71 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:84aa6c00 r4:84aa6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aa6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab6040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aa6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f549000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b7138c r4:85b71000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b7138c r4:8474d400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa6c00 r8:8474d42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d400 r8:8027ed34 r7:dfc75e60 r6:847b1c00 r5:84aa6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481ea80 INFO: task kworker/1:71:3270 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c01c0000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 r5:8524af8c r4:8524ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:84aa0c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b223c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aa0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed383000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc938c r4:85bc9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bc938c r4:8474d480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa0c00 r8:8474d4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d480 r8:8027ed34 r7:dfc59e60 r6:847b1c80 r5:84aa0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481e4c0 INFO: task kworker/1:72:3271 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c035b000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:13:3274 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred r4:848bbc00 r5:848bbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85794b8c r4:847b1d00 Exception stack(0xdfb7dfb0 to 0xdfb7dff8) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:73:3279 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:73 state:D stack:0 pid:3279 tgid:3279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:8458a400 r4:8458a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8458a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abe040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8458a400 r7:00000000 r6:83018200 r5:00001000 r4:7f51b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed28d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b67f8c r4:85b67c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b67f8c r4:8474d500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8458a400 r8:8474d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d500 r8:8027ed34 r7:dfc59e60 r6:847b1f00 r5:8458a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8481ec80 INFO: task kworker/1:73:3279 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c0680000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3280 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc95d84 r8:00000002 r7:60000013 r6:dfc95d8c r5:84588c00 r4:84588c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84588c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84588c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7cb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85794f8c r4:85794c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85794f8c r4:847b1f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84588c00 r8:847b1fac r7:82804d40 r6:dddced40 r5:dddced60 r4:847b1f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b1f80 r8:8027ed34 r7:dfc7de60 r6:84a19000 r5:84588c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc95fb0 to 0xdfc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a1e440 INFO: task kworker/0:15:3280 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c0a98000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:74 state:D stack:0 pid:3282 tgid:3282 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8458bc00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85be1f8c r4:85be1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85be1f8c r4:8474d580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8458bc00 r8:8474d5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d580 r8:8027ed34 r7:dfc59e60 r6:84a19080 r5:8458bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e000 INFO: task kworker/1:74:3282 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c0f7e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:75:3283 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:75 state:D stack:0 pid:3283 tgid:3283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84589800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca5e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8474d600 r8:8027ed34 r7:dfca1e60 r6:84a19100 r5:84589800 r4:8474e000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaeb5d20 to 0xeaeb5d68) r4:eaeb5dc0 r4:00000000 r5:8524af8c r4:8524ac00 r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:76:3285 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:76 state:D stack:0 pid:3285 tgid:3285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcadd84 r8:00000002 r7:60000113 r6:dfcadd8c r5:8458d400 r4:8458d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8458d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85808cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8458d400 r7:00000000 r6:83018200 r5:00001000 r4:7f673000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc61000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b73b8c r4:85b73800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b73b8c r4:8474d680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8458d400 r8:8474d6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d680 r8:8027ed34 r7:dfca5e60 r6:84a19180 r5:8458d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e000 INFO: task kworker/1:76:3285 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c0f7e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:77:3287 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:77 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcbdd84 r8:00000002 r7:60000013 r6:dfcbdd8c r5:8458c800 r4:8458c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8458c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f6e00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8458c800 r7:00000000 r6:83018200 r5:00001000 r4:7f873000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd13000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8480178c r4:84801400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8480178c r4:8474d700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8458c800 r8:8474d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d700 r8:8027ed34 r7:dfcade60 r6:84a19200 r5:8458c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcbdfb0 to 0xdfcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e1c0 INFO: task kworker/1:77:3287 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c0f7e000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:78:3289 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:78 state:D stack:0 pid:3289 tgid:3289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcd1d84 r8:00000002 r7:60000113 r6:dfcd1d8c r5:8458ec00 r4:8458ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8458ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85808980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8458ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f697000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7d9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847ffb8c r4:847ff800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847ffb8c r4:8474d780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8458ec00 r8:8474d7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d780 r8:8027ed34 r7:dfcbde60 r6:84a19280 r5:8458ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd1fb0 to 0xdfcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e300 INFO: task kworker/1:78:3289 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c1421000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:79:3291 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:79 state:D stack:0 pid:3291 tgid:3291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcd9d84 r8:00000002 r7:60000113 r6:dfcd9d8c r5:84960c00 r4:84960c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84960c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596c2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84960c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6ef000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb23000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bfc78c r4:85bfc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bfc78c r4:8474d800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84960c00 r8:8474d82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d800 r8:8027ed34 r7:dfcbde60 r6:84a19300 r5:84960c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd9fb0 to 0xdfcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e400 INFO: task kworker/1:79:3291 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c16da000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84960000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d880 r8:8027ed34 r7:dfcbde60 r6:84a19380 r5:84960000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce5fb0 to 0xdfce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e540 INFO: task kworker/1:80:3293 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c16da000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:81:3295 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:81 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcf9d84 r8:00000002 r7:60000113 r6:dfcf9d8c r5:84963000 r4:84963000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84963000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84963000 r7:00000000 r6:83018200 r5:00001000 r4:7f713000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed74f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c26b8c r4:85c26800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c26b8c r4:8474d900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84963000 r8:8474d92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d900 r8:8027ed34 r7:dfcbde60 r6:84a19400 r5:84963000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e6c0 INFO: task kworker/1:81:3295 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c1b07000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:82:3297 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:82 state:D stack:0 pid:3297 tgid:3297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:84961800 r4:84961800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84961800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd05e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474e800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84961800 r7:00000000 r6:83018200 r5:00001000 r4:7f735000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5e1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f878c r4:858f8400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858f878c r4:8474d980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84961800 r8:8474d9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474d980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474d980 r8:8027ed34 r7:dfcbde60 r6:84a19480 r5:84961800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd05fb0 to 0xdfd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474e900 INFO: task kworker/1:82:3297 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c1b07000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84963c00 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd0de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580c340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84963c00 r7:00000000 r6:83018200 r5:00001000 r4:7f7e3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede1f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c4878c r4:85c48400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c4878c r4:8474da00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84963c00 r8:8474da2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8474da00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474da00 r8:8027ed34 r7:dfcbde60 r6:84a19500 r5:84963c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd0dfb0 to 0xdfd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8474eac0 INFO: task kworker/1:83:3300 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c2629000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 INFO: task kworker/1:84:3301 blocked for more than 452 seconds. r4:84964800 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd11e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85488200 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b79e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:16 state:D stack:0 pid:3304 tgid:3304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcf1d84 r8:00000002 r7:60000013 r6:dfcf1d8c r5:84965400 r4:84965400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84965400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84965400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579578c r4:85795400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579578c r4:84a19600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84965400 r8:84a1962c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a19600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a19600 r8:8027ed34 r7:dfc7de60 r6:84a19680 r5:84965400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf1fb0 to 0xdfcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a5b0c0 INFO: task kworker/0:16:3304 is blocked on a mutex likely owned by task kworker/1:273:4493. task:kworker/1:273 state:R running task stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85214800 r8:80200be4 r7:eaeb5d54 r6:ffffffff r5:85214800 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaeb5d20 to 0xeaeb5d68) 5d20: c2629000 eceef000 00000001 80239bb8 7f3cf000 00000001 82ac11c4 82ac05a0 5d40: 7f3cf000 eceef000 8280c9b4 eaeb5d9c eaeb5da0 eaeb5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaeb5dc0 r5:eaeb5e08 r4:eaeb5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524af8c r4:8524ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524af8c r4:84b79e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84b79eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b79e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b79e80 r8:8027ed34 r7:eaeade60 r6:84b79f00 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:85:3305 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:85 state:D stack:0 pid:3305 tgid:3305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd29d84 r8:00000002 r7:60000113 r6:dfd29d8c r5:84966000 r4:84966000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vm <> 5ae6000 r4:85ae6000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ae6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed879e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3d1c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ae6000 r7:00000000 r6:83018200 r5:00001000 r4:7f4c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed40d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:85b5f78c r4:85b3b080 Exception stack(0xed879fb0 to 0xed879ff8) task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaf0ddc0 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:707:7214 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:707 state:D stack:0 pid:7214 tgid:7214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed87dd84 r8:00000002 r7:60000013 r6:ed87dd8c r5:85af0000 r4:85af0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85af0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed87de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ed421000 Exception stack(0xed87dfb0 to 0xed87dff8) dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:708:7215 blocked for more than 474 seconds. task:kworker/1:708 state:D stack:0 pid:7215 tgid:7215 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85af0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed881e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85af0c00 r8:85b3b2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaf0dd20 to 0xeaf0dd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:709 state:D stack:0 pid:7218 tgid:7218 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85af1800 r4:829187f0 r4:00000000 r9:83018205 r8:85af1800 r7:00000000 r6:83018200 r5:00001000 r4:7f4cd000 r10:61c88647 r9:85af1800 r8:85b3b3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:eaf0ddc0 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:710:7219 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:710 state:D stack:0 pid:7219 tgid:7219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed88dd84 r8:00000002 r7:60000013 r6:ed88dd8c r5:85af3000 r4:85af3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85af3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed88de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3d980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85af3000 r7:00000000 r6:83018200 r5:00001000 r4:7f4cf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed467000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6478c r4:85b64400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b6478c r4:85b3b480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85af3000 r8:85b3b4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b3b480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3b480 r8:8027ed34 r7:ed889e60 r6:85b3b500 r5:85af3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed88dfb0 to 0xed88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b3d4c0 INFO: task kworker/1:710:7219 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:80070113 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r5:85a5178c r4:85a51400 r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:711:7221 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred r5:85af4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85b64b8c r4:85b64800 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8613e000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:712:7223 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:712 state:D stack:0 pid:7223 tgid:7223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed885d84 r8:00000002 r7:60000113 r6:ed885d8c r5:85af2400 r4:85af2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85af2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed885e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b21b80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85af2400 r7:00000000 r6:83018200 r5:00001000 r4:7f4d5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6538c r4:85b65000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b6538c r4:85b3b580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85af2400 r8:85b3b5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b3b580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3b580 r8:8027ed34 r7:ed891e60 r6:85b3b700 r5:85af2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed885fb0 to 0xed885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b3da80 INFO: task kworker/1:712:7223 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85af3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3dcc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85af3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4d3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed497000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b64f8c r4:85b64c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b64f8c r4:85b3b780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85af3c00 r8:85b3b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b3b780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3b780 r8:8027ed34 r7:ed885e60 r6:85b3b800 r5:85af3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed895fb0 to 0xed895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b21300 INFO: task kworker/1:713:7225 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 86877000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85af5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b42040 r4:85b3b880 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeaf0dd20 to 0xeaf0dd68) r4:eaf0ddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:715:7229 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:715 state:D stack:0 pid:7229 tgid:7229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed8a1d84 r8:00000002 r7:60000113 r6:ed8a1d8c r5:85af8c00 r4:85af8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85af8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b424c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85af8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4db000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4f1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b65b8c r4:85b65800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b65b8c r4:85b3b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85af8c00 r8:85b3b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b42200 INFO: task kworker/1:715:7229 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 86d30000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:716 state:D stack:0 pid:7232 tgid:7232 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85af9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:85b423c0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:eaf0ddc0 r5:00001000 r4:ecf7b000 r4:84879f00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ed8b5d84 r8:00000002 r7:60000113 r6:ed8b5d8c r5:85afa400 r5:85afa400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b42a00 r10:61c88647 r9:85afa400 r8:85b3bbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:eaf0ddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:718:7238 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:718 state:D stack:0 pid:7238 tgid:7238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed8b9d84 r8:00000002 r7:60000113 r6:ed8b9d8c r5:85afbc00 r4:85afbc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85afbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8b9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b42c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85afbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f4e5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed697000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6678c r4:85b66400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b6678c r4:85b3bc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85afbc00 r8:85b3bcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85a5178c r4:85a51400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85af8000 r4:829187f0 r4:00000000 r4:85b3bd80 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85afd400 r5:85afd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8bde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3a040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85afd400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6738c r4:85b67000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b6738c r4:85b3be80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85afd400 r8:85b3beac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b3be80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3be80 r8:8027ed34 r7:ed8b1e60 r6:85b3bf00 r5:85afd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed8bdfb0 to 0xed8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 r4:84879f00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85afc800 r4:829187f0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85afe000 r4:829187f0 r4:00000000 r10:61c88647 r9:85afe000 r8:85b370ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed89dfb0 to 0xed89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b3a300 INFO: task kworker/1:722:7250 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 87e64000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:ecf7b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85afec00 r4:829187f0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r5:85a5178c r4:85a51400 r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:724:7322 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:724 state:D stack:0 pid:7322 tgid:7322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85af6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85b67b8c r4:85b37280 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85af6000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8a5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abe2c0 r4:00000000 r9:83018205 r8:85af6000 r7:00000000 r6:83018200 r5:00001000 r4:7f523000 r10:61c88647 r9:85af6000 r8:85b373ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaf0ddc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:726:7336 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:726 state:D stack:0 pid:7336 tgid:7336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed951d84 r8:00000002 r7:60000113 r6:ed951d8c r5:85afb000 r5:85afb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85b7038c r4:85b70000 r4:00000001 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:7339 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:7339 tgid:7339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed955d84 r8:00000002 r7:60000013 r6:ed955d8c r5:85b00000 r4:85b00000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b00000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed955e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85b37580 r4:85abe380 Exception stack(0xeaf0dd20 to 0xeaf0dd68) r4:82ac11e4 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:728:7341 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:728 state:D stack:0 pid:7341 tgid:7341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed959d84 r8:00000002 r7:60000113 r6:ed959d8c r5:85b00c00 r4:85b00c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b00c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed959e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:729:7344 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:729 state:D stack:0 pid:7344 tgid:7344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed95dd84 r8:00000002 r7:60000113 r6:ed95dd8c r5:85b01800 r4:85b01800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b01800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed95de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abe8c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85b01800 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6ff000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b70f8c r4:85b70c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b70f8c r4:85b37780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b01800 r8:85b377ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b37780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r5:85a5178c r4:85a51400 r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:7347 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:7347 tgid:7347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb921d84 r8:00000002 r7:60000113 r6:eb921d8c r5:85b02400 r4:85b02400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b02400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb921e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85b71b8c r4:85b37880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b02400 r8:85b378ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b37880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b37880 r8:8027ed34 r7:ed95de60 r6:85b37900 r5:85b02400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb921fb0 to 0xeb921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85abe800 INFO: task kworker/1:730:7347 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:731:7349 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:731 state:D stack:0 pid:7349 tgid:7349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85b03000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed93de08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b7178c r4:85b37980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b03000 r8:85b379ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b37980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b37980 r8:8027ed34 r7:eb921e60 r6:85b37a00 r5:85b03000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed93dfb0 to 0xed93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:eaf0ddc0 r5:00001000 r4:ecf7b000 r4:84879f00 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:732:7385 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:732 state:D stack:0 pid:7385 tgid:7385 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85b05400 r5:85b05400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:85b05400 r7:00000000 r6:83018200 r5:00001000 r4:7f579000 r7:ddde2d40 r6:83018200 r5:85b71f8c r4:85b37a80 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8a1fc000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) task:kworker/1:733 state:D stack:0 pid:7389 tgid:7389 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed9bde08 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab6b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85b04800 r7:00000000 r6:83018200 r5:00001000 r4:7f57b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9c5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bda78c r4:85bda400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bda78c r4:85b37b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b04800 r8:85b37bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b37b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b37b80 r8:8027ed34 r7:ed965e60 r6:85b37c00 r5:85b04800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r4:eaf0ddc0 r5:00001000 r4:ecf7b000 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 task:kworker/1:734 state:D stack:0 pid:7391 tgid:7391 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85b03c00 r7:00000000 r6:83018200 r5:00001000 r4:7f57d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9cb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b7238c r4:85b72000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b7238c r4:85b37c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b03c00 r8:85b37cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85b37c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b37c80 r8:8027ed34 r7:ed9bde60 r6:85b37d00 r5:85b03c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80070113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 INFO: task kworker/1:735:7393 blocked for more than 475 seconds. r5:85b06000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:85b7278c r4:85b72400 r4:00000001 Exception stack(0xed9a9fb0 to 0xed9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab6d00 INFO: task kworker/1:735:7393 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8acce000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:736:7395 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:736 state:D stack:0 pid:7395 tgid:7395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed9d5d84 r8:00000002 r7:60000113 r6:ed9d5d8c r5:85b06c00 r4:85b06c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b06c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed9d5e08 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r5:80070113 r4:80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:83a0ec00 r5:83a0ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed9e5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab6740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a0ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f583000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9e1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b72b8c r4:85b72800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b72b8c r4:85b37f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a0ec00 r8:85b37fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeaf0dd20 to 0xeaf0dd68) r5:85a5178c r4:85a51400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8506a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda99e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a3cb00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b72f8c r4:85b72c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84368700 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r5:85069800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:85bea38c r4:85bea000 r4:85a3cec0 r4:82ac11e4 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8506e000 r4:829187f0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:84879f00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8506bc00 r4:829187f0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85808f40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f677000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc6d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847ff78c r4:847ff400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847ff78c r4:855e4280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 INFO: task kworker/1:742:7544 blocked for more than 475 seconds. r5:8506b000 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000000 r4:00000000 r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:743:7546 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:743 state:D stack:0 pid:7546 tgid:7546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:edc79d84 r8:00000002 r7:60000113 r6:edc79d8c r5:85068c00 r4:85068c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85068c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc79e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598e940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85068c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6cb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd11000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b12f8c r4:85b12c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b12f8c r4:855e4480 r4:855e4480 9fa0: 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:7589 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:744 state:D stack:0 pid:7589 tgid:7589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8506ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598e540 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80070113 ffffffff r4:eaf0ddc0 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:84879f00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8506c800 r4:829187f0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 5fa0: 00000000 00000000 00000000 00000000 r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:85068000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc85e08 r4:855e4780 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Call trace: r5:8506d400 r4:829187f0 r4:00000000 r4:855e4880 INFO: task kworker/1:747:7628 is blocked on a mutex likely owned by task kworker/0:421:4512. r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:748:7632 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:748 state:D stack:0 pid:7632 tgid:7632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:edd69d84 r8:00000002 r7:60000113 r6:edd69d8c r5:85888000 r4:85888000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85888000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd69e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000000 r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85889800 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:8480038c r4:84800000 r4:855e4a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e4a80 r8:8027ed34 r7:edd69e60 r6:855e4b00 r5:85889800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedda1fb0 to 0xedda1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854823c0 INFO: task kworker/1:749:7643 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd60: 80070113 ffffffff r5:00001000 r4:ecf7b000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:8588a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8d776000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 r4:00000001 task:kworker/1:751 state:D stack:0 pid:7654 tgid:7654 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8588bc00 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482f40 9fa0: 00000000 00000000 00000000 00000000 r4:eaf0ddc0 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:752:7676 blocked for more than 475 seconds. r10:829187f4 r9:eddd5d84 r8:00000002 r7:60000113 r6:eddd5d8c r5:8588d400 r5:8588d400 r4:829187f0 r4:00000000 r4:855e4d80 INFO: task kworker/1:752:7676 is blocked on a mutex likely owned by task kworker/0:421:4512. dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r5:8588e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/1:753:7699 is blocked on a mutex likely owned by task kworker/0:421:4512. r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:847915c0 task:kworker/1:754 state:D stack:0 pid:7712 tgid:7712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ede15d84 r8:00000002 r7:60000113 r6:ede15d8c r5:8588ec00 r4:8588ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8588ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede15e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474e840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8588ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f7bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:eaf0ddc0 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 INFO: task kworker/1:755:7738 blocked for more than 475 seconds. r5:8588c800 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab7d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8588c800 r7:00000000 r6:83018200 r5:00001000 r4:7f7f5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf05000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c4ab8c r4:85c4a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c4ab8c r4:859ad080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 r4:eaf0ddc0 r5:85a5178c r4:85a51400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85290000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd95e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854886c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85290000 r7:00000000 r6:83018200 r5:00001000 r4:7f82f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:859ad180 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd95fb0 to 0xedd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab7a80 INFO: task kworker/1:756:7768 is blocked on a mutex likely owned by task kworker/0:421:4512. Exception stack(0xeaf0dd20 to 0xeaf0dd68) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) task:kworker/1:757 state:D stack:0 pid:7798 tgid:7798 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85293000 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85488300 9fa0: 00000000 00000000 00000000 00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 INFO: task kworker/1:758:7802 blocked for more than 475 seconds. task:kworker/1:758 state:D stack:0 pid:7802 tgid:7802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:edfd5d84 r8:00000002 r7:60000113 r6:edfd5d8c r5:85293c00 r4:85293c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85293c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edfd5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85488880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85293c00 r7:00000000 r6:83018200 r5:00001000 r4:7f831000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda23000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f9f8c r4:858f9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 Workqueue: events bpf_prog_free_deferred r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:847915c0 r5:85291800 r4:829187f0 r4:00000000 r5:858fa38c r4:858fa000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8efe5000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Call trace: r5:85294800 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:00000000 r9:859ad580 r8:8027ed34 r7:edfd9e60 r6:859ad600 r5:85294800 dd60: 80070113 ffffffff r5:00001000 r4:ecf7b000 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:7808 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85296000 r5:85296000 r4:829187f0 r4:00000000 r5:858fab8c r4:858fa800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:762:7810 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:7810 tgid:7810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:edfe1d84 r8:00000002 r7:60000013 r6:edfe1d8c r5:85295400 r5:85295400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edfe1e08 r10:00000000 r9:859ad780 r8:8027ed34 r7:edfdde60 r6:859ad800 r5:85295400 INFO: task kworker/1:762:7810 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) r4:85290c00 r5:85290c00 r4:829187f0 r4:00000000 r5:858fb38c r4:858fb000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:829187f4 r9:edfedd84 r8:00000002 r7:60000113 r6:edfedd8c r5:85296c00 r5:85296c00 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a39300 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 8fb05000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r4:eaf0ddc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:85726000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:859ada80 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:766:7819 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:766 state:D stack:0 pid:7819 tgid:7819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:edf51d84 r8:00000002 r7:60000013 r6:edf51d8c r5:85724800 r4:85724800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85724800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:84879f00 task:kworker/1:767 state:D stack:0 pid:7821 tgid:7821 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d40 r6:83018200 r5:844a938c r4:859adb80 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:84879f00 INFO: task kworker/1:768:7822 blocked for more than 475 seconds. [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edff5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a39540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85726c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede07000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84800f8c r4:84800c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84800f8c r4:859adc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85726c00 r8:859adc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859adc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859adc00 r8:8027ed34 r7:edff1e60 r6:85965100 r5:85726c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedff5fb0 to 0xedff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a39700 INFO: task kworker/1:768:7822 is blocked on a mutex likely owned by task kworker/0:421:4512. Exception stack(0xeaf0dd20 to 0xeaf0dd68) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r5:85292400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edff9e08 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeaf0dd20 to 0xeaf0dd68) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84879f00 INFO: task kworker/1:770:7828 blocked for more than 475 seconds. r5:85888c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a39d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85888c00 r7:00000000 r6:83018200 r5:00001000 r4:7f84d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede91000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Not tainted 6.15.0-syzkaller #0 r5:858a0c00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:859ade80 INFO: task kworker/1:771:7830 is blocked on a mutex likely owned by task kworker/0:421:4512. r5:00001000 r4:ecf7b000 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) task:kworker/1:772 state:D stack:0 pid:7832 tgid:7832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:edffdd84 r8:00000002 r7:60000013 r6:edffdd8c r5:858a0000 r4:858a0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858a0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edffde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ac2040 r10:61c88647 r9:858a0000 r8:859adfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 dd20: 929db000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 r4:84879f00 Not tainted 6.15.0-syzkaller #0 task:kworker/1:773 state:D stack:0 pid:7834 tgid:7834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee00dd84 r8:00000002 r7:60000013 r6:ee00dd8c r5:858a3000 r4:858a3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858a3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee00de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ac2580 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaf0ddc0 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:84879f00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:858a1800 r4:829187f0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 934c6000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 Call trace: r5:858a3c00 r4:829187f0 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 task:kworker/1:776 state:D stack:0 pid:7842 tgid:7842 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:777:7844 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:777 state:D stack:0 pid:7844 tgid:7844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:858a6000 r4:829187f0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:858a6000 r8:85ab34ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85ac2b00 r4:82ac11e4 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:778:7846 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred r5:858a2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85ab3580 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: 94fe7000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r5:858a4800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee065e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ac2ec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:858a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f861000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee051000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c65f8c r4:85c65c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c65f8c r4:85ab3680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a4800 r8:85ab36ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85ab3680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab3680 r8:8027ed34 r7:ee059e60 r6:85ab3700 r5:858a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee065fb0 to 0xee065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ac2c80 INFO: task kworker/1:779:7848 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 94fe7000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:00000000 r5:00001000 r4:ecf7b000 r5:85a5178c r4:85a51400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:858a6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee0a5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:858a6c00 r8:85ab37ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:780:7857 is blocked on a mutex likely owned by task kworker/0:421:4512. [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 953de000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:7864 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:7864 tgid:7864 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85c18c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:85c1a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c1a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee009e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f6380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85c1a400 r7:00000000 r6:83018200 r5:00001000 r4:7f7bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7c9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c6738c r4:85c67000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c6738c r4:85ab3980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:eaf0ddc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ee11dd84 r8:00000002 r7:60000113 r6:ee11dd8c r5:85c1c800 r4:85c1c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c1c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee11de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f6580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85c1c800 r7:00000000 r6:83018200 r5:00001000 r4:7f831000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda1b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c67b8c r4:85c67800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c67b8c r4:85ab3a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c1c800 r8:85ab3aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85ab3a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab3a80 r8:8027ed34 r7:ee009e60 r6:85ab3b00 r5:85c1c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee11dfb0 to 0xee11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:783:7908 is blocked on a mutex likely owned by task kworker/0:421:4512. dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:85a5178c r4:85a51400 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) r4:85c1bc00 r5:85c1bc00 r4:829187f0 [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c6778c r4:85c67400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c6778c r4:85ab3b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c1bc00 r8:85ab3bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85ab3b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab3b80 r8:8027ed34 r7:ee11de60 r6:85ab3c00 r5:85c1bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee0f5fb0 to 0xee0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f66c0 INFO: task kworker/1:784:7909 is blocked on a mutex likely owned by task kworker/0:421:4512. r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Workqueue: events bpf_prog_free_deferred r5:85c1d400 r4:829187f0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/1:785:7911 is blocked on a mutex likely owned by task kworker/0:421:4512. [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 INFO: task kworker/1:786:7925 blocked for more than 476 seconds. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:85c1ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f84f000 r4:857f6a40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaf0ddc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:788:7938 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:788 state:D stack:0 pid:7938 tgid:7938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee081e08 r7:ddde2d40 r6:83018200 r5:85c7078c r4:85ab3f80 r4:857f6f00 dd60: 80070113 ffffffff [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:789:7940 blocked for more than 476 seconds. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:eaf0ddc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:7942 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:7942 tgid:7942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee15dd84 r8:00000002 r7:60000013 r6:ee15dd8c r5:85c18000 r4:85c18000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c18000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee15de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598c2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85c18000 r7:00000000 r6:83018200 r5:00001000 r4:7f8cd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc65000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c70b8c r4:85c70800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee15dfb0 to 0xee15dff8) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r5:00001000 r4:ecf7b000 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) Call trace: [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:eaf0ddc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee165e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85c10c00 r7:00000000 r6:83018200 r5:00001000 r4:7f8d1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eddaf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7138c r4:85c71000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7138c r4:85824380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c10c00 r8:858243ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85824380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824380 r8:8027ed34 r7:ee161e60 r6:85824400 r5:85c10c00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:793 state:D stack:0 pid:7948 tgid:7948 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:ede21000 r4:00000001 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 99946000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:ede3b000 r4:00000001 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 Not tainted 6.15.0-syzkaller #0 r4:85c13000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xee171fb0 to 0xee171ff8) Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ecf7b000 r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ee175d84 r8:00000002 r7:60000013 r6:ee175d8c r5:85c13c00 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:85c13c00 r7:00000000 r6:83018200 r5:00001000 r4:7f8d9000 r10:61c88647 r9:85c13c00 r8:858246ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8590a540 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:eaf0ddc0 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:7956 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:7956 tgid:7956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee10dd84 r8:00000002 r7:60000013 r6:ee10dd8c r5:85c15400 r4:85c15400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c15400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee10de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590aa80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85c15400 r7:00000000 r6:83018200 r5:00001000 r4:7f8dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf15000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c72b8c r4:85c72800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c72b8c r4:85824880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c15400 r8:858248ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85824880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824880 r8:8027ed34 r7:ee175e60 r6:85824900 r5:85c15400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee10dfb0 to 0xee10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred dd60: 80070113 ffffffff r4:eaf0ddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:85c7278c r4:85c72400 r4:85824980 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8590a540 INFO: task kworker/1:798:7958 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9aadc000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:7960 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xee185fb0 to 0xee185ff8) Workqueue: events bpf_prog_free_deferred dd60: 80070113 ffffffff [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) Not tainted 6.15.0-syzkaller #0 r5:84af8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85824a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824a80 r8:8027ed34 r7:ee185e60 r6:85965280 r5:84af8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee18dfb0 to 0xee18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8590ab80 INFO: task kworker/1:800:7962 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9b70a000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:84af8000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 dd20: 9b70a000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:edf4b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c73b8c r4:85c73800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c73b8c r4:85824b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afbc00 r8:85824bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85824b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824b80 r8:8027ed34 r7:ee199e60 r6:85965380 r5:84afbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1a1fb0 to 0xee1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85488800 INFO: task kworker/1:802:7967 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9bd40000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 INFO: task kworker/1:803:7968 blocked for more than 476 seconds. r4:84af9800 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:85c73f8c r4:85c73c00 r10:00000000 r9:85824c00 r8:8027ed34 r7:ee1a1e60 r6:85965400 r5:84af9800 task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaf0ddc0 r4:00000000 r5:85a5178c r4:85a51400 r4:84879f00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7cf8c r4:85c7cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7cf8c r4:85824c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afa400 r8:85824cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85824c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824c80 r8:8027ed34 r7:ee1a5e60 r6:85965480 r5:84afa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1adfb0 to 0xee1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b27e40 INFO: task kworker/1:804:7970 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9c4fc000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:805:7972 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:805 state:D stack:0 pid:7972 tgid:7972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee1b5d84 r8:00000002 r7:60000013 r6:ee1b5d8c r5:84afb000 r5:84afb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1b5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84afb000 r7:00000000 r6:83018200 r5:00001000 r4:7f8e9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf6b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7c38c r4:85c7c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7c38c r4:85824d00 r10:61c88647 r9:84afb000 r8:85824d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 dd20: 9c7ef000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85c14800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856162c0 INFO: task kworker/1:806:7973 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9cc9f000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:807 state:D stack:0 pid:7976 tgid:7976 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:85c7cb8c r4:85824e80 Exception stack(0xee1b9fb0 to 0xee1b9ff8) Workqueue: events bpf_prog_free_deferred dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 r4:84879f00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xee1bdfb0 to 0xee1bdff8) task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaf0ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:809:7980 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:809 state:D stack:0 pid:7980 tgid:7980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee1c1d84 r8:00000002 r7:60000013 r6:ee1c1d8c r5:85078000 r4:85078000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85078000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1c1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078000 r7:00000000 r6:83018200 r5:00001000 r4:7f8f5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee115000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7db8c r4:85c7d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7db8c r4:85834080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:858340ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834080 r8:8027ed34 r7:ee1bde60 r6:85834100 r5:85078000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:eaf0ddc0 r4:00000000 r5:85a5178c r4:85a51400 r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 INFO: task kworker/1:810:7982 blocked for more than 476 seconds. r5:85078c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:85c7d78c r4:85834180 Exception stack(0xee1c5fb0 to 0xee1c5ff8) task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9dc49000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:811:7985 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:811 state:D stack:0 pid:7985 tgid:7985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee1cdd84 r8:00000002 r7:60000013 r6:ee1cdd8c r5:85079800 r4:85079800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85079800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1cde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:ee121000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xeaf0dd20 to 0xeaf0dd68) r4:eaf0ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee181e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:eaf0ddc0 r4:00000000 r5:85a5178c r4:85a51400 r4:84879f00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f8f9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee12b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7e38c r4:85c7e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7e38c r4:85834480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507bc00 r8:858344ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834480 r8:8027ed34 r7:ee181e60 r6:85834500 r5:8507bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1d5fb0 to 0xee1d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85616bc0 INFO: task kworker/1:813:7989 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9efe5000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 Not tainted 6.15.0-syzkaller #0 r5:8507c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507e000 r7:00000000 r6:83018200 r5:00001000 r4:7f905000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee203000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7ef8c r4:85c7ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7ef8c r4:85834680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507e000 r8:858346ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834680 r8:8027ed34 r7:ee181e60 r6:85834700 r5:8507e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1f9fb0 to 0xee1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8590bfc0 INFO: task kworker/1:815:7994 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9f61d000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:816:7996 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:816 state:D stack:0 pid:7996 tgid:7996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee201d84 r8:00000002 r7:60000013 r6:ee201d8c r5:8507d400 r4:8507d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8507d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee201e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535100 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507d400 r7:00000000 r6:83018200 r5:00001000 r4:7f903000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee1f5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7eb8c r4:85c7e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7eb8c r4:85834780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507d400 r8:858347ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834780 r8:8027ed34 r7:ee1f9e60 r6:85834800 r5:8507d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee201fb0 to 0xee201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855350c0 INFO: task kworker/1:816:7996 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: 9f61d000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:817:7998 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:817 state:D stack:0 pid:7998 tgid:7998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee20dd84 r8:00000002 r7:60000013 r6:ee20dd8c r5:850a8000 r4:850a8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee20de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855355c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f907000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee209000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7f38c r4:85c7f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7f38c r4:85834880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a8000 r8:858348ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834880 r8:8027ed34 r7:ee1f9e60 r6:85834900 r5:850a8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee20dfb0 to 0xee20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85535340 INFO: task kworker/1:817:7998 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a001c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:818:7999 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:818 state:D stack:0 pid:7999 tgid:7999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee215d84 r8:00000002 r7:60000113 r6:ee215d8c r5:850a9800 r4:850a9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee215e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f90b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee21d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7f78c r4:85c7f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7f78c r4:85834980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a9800 r8:858349ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834980 r8:8027ed34 r7:ee20de60 r6:85834a00 r5:850a9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee215fb0 to 0xee215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85535580 INFO: task kworker/1:818:7999 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a001c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:819:8003 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:819 state:D stack:0 pid:8003 tgid:8003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee229d84 r8:00000002 r7:60000013 r6:ee229d8c r5:850aa400 r4:850aa400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850aa400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee229e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f911000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee237000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8438c r4:85c84000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8438c r4:85834a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850aa400 r8:85834aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834a80 r8:8027ed34 r7:ee215e60 r6:85834b00 r5:850aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee229fb0 to 0xee229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85535180 INFO: task kworker/1:819:8003 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a001c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:820:8005 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:820 state:D stack:0 pid:8005 tgid:8005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee1d1d84 r8:00000002 r7:60000013 r6:ee1d1d8c r5:84afd400 r4:84afd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84afd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1d1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84afd400 r7:00000000 r6:83018200 r5:00001000 r4:7f90d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee22b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7fb8c r4:85c7f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7fb8c r4:85834b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afd400 r8:85834bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834b80 r8:8027ed34 r7:ee229e60 r6:85965580 r5:84afd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1d1fb0 to 0xee1d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85535a40 INFO: task kworker/1:820:8005 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a0919000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:821:8007 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:821 state:D stack:0 pid:8007 tgid:8007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee1e5d84 r8:00000002 r7:60000113 r6:ee1e5d8c r5:84afc800 r4:84afc800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84afc800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1e5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535b40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84afc800 r7:00000000 r6:83018200 r5:00001000 r4:7f90f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee231000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7ff8c r4:85c7fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c7ff8c r4:85834c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afc800 r8:85834c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834c00 r8:8027ed34 r7:ee229e60 r6:85965600 r5:84afc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1e5fb0 to 0xee1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85535b80 INFO: task kworker/1:821:8007 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a0e5c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:822:8009 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:822 state:D stack:0 pid:8009 tgid:8009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee241d84 r8:00000002 r7:60000113 r6:ee241d8c r5:84afec00 r4:84afec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84afec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee241e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84afec00 r7:00000000 r6:83018200 r5:00001000 r4:7f7bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c84f8c r4:85c84c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c84f8c r4:85834c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afec00 r8:85834cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834c80 r8:8027ed34 r7:ee229e60 r6:85965680 r5:84afec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee241fb0 to 0xee241ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85535cc0 INFO: task kworker/1:822:8009 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a1828000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:823:8011 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:823 state:D stack:0 pid:8011 tgid:8011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee155d84 r8:00000002 r7:60000013 r6:ee155d8c r5:84afe000 r4:84afe000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84afe000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee155e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f913000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee23d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8478c r4:85c84400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8478c r4:85834d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84afe000 r8:85834d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834d00 r8:8027ed34 r7:ee241e60 r6:85965700 r5:84afe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee155fb0 to 0xee155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855354c0 INFO: task kworker/1:823:8011 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a1828000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:824:8014 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:824 state:D stack:0 pid:8014 tgid:8014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee251d84 r8:00000002 r7:60000113 r6:ee251d8c r5:85cc8c00 r4:85cc8c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cc8c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee251e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85535f40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cc8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f75f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd1f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c84b8c r4:85c84800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c84b8c r4:85834d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cc8c00 r8:85834dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834d80 r8:8027ed34 r7:ee241e60 r6:85965780 r5:85cc8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee251fb0 to 0xee251ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915080 INFO: task kworker/1:824:8014 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a1bcf000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:825:8015 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:825 state:D stack:0 pid:8015 tgid:8015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee255d84 r8:00000002 r7:60000113 r6:ee255d8c r5:85cc9800 r4:85cc9800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cc9800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee255e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859151c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cc9800 r7:00000000 r6:83018200 r5:00001000 r4:7f82f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed82b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8538c r4:85c85000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8538c r4:85834e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cc9800 r8:85834e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834e00 r8:8027ed34 r7:ee241e60 r6:85965800 r5:85cc9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee255fb0 to 0xee255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915080 INFO: task kworker/1:825:8015 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a1bcf000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:826:8018 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:826 state:D stack:0 pid:8018 tgid:8018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee261d84 r8:00000002 r7:60000013 r6:ee261d8c r5:85cc8000 r4:85cc8000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cc8000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee261e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cc8000 r7:00000000 r6:83018200 r5:00001000 r4:7f915000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c85f8c r4:85c85c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c85f8c r4:85834e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cc8000 r8:85834eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834e80 r8:8027ed34 r7:ee255e60 r6:85965880 r5:85cc8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee261fb0 to 0xee261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915180 INFO: task kworker/1:826:8018 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a22fb000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:827:8019 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:827 state:D stack:0 pid:8019 tgid:8019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee265d84 r8:00000002 r7:60000013 r6:ee265d8c r5:85ccbc00 r4:85ccbc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ccbc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee265e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ccbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f831000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9f3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8578c r4:85c85400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8578c r4:85834f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ccbc00 r8:85834f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834f00 r8:8027ed34 r7:ee261e60 r6:85965900 r5:85ccbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee265fb0 to 0xee265ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915180 INFO: task kworker/1:827:8019 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a2884000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:828:8020 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:828 state:D stack:0 pid:8020 tgid:8020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee221d84 r8:00000002 r7:60000013 r6:ee221d8c r5:850ab000 r4:850ab000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850ab000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee221e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f84f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edaad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c85b8c r4:85c85800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c85b8c r4:85834f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ab000 r8:85834fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85834f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85834f80 r8:8027ed34 r7:ee261e60 r6:85979000 r5:850ab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee221fb0 to 0xee221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859152c0 INFO: task kworker/1:828:8020 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a2d8b000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:829:8024 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:829 state:D stack:0 pid:8024 tgid:8024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee269d84 r8:00000002 r7:60000113 r6:ee269d8c r5:850ac800 r4:850ac800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850ac800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee269e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859157c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f917000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edde3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8638c r4:85c86000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8638c r4:85979080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ac800 r8:859790ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979080 r8:8027ed34 r7:ee261e60 r6:85979100 r5:850ac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee269fb0 to 0xee269ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915580 INFO: task kworker/1:829:8024 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a30f9000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:830:8026 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:830 state:D stack:0 pid:8026 tgid:8026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee25dd84 r8:00000002 r7:60000113 r6:ee25dd8c r5:850ad400 r4:850ad400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850ad400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee25de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f919000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede01000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8678c r4:85c86400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8678c r4:85979180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ad400 r8:859791ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979180 r8:8027ed34 r7:ee269e60 r6:85979200 r5:850ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee25dfb0 to 0xee25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915780 INFO: task kworker/1:830:8026 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a387a000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:831:8027 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:831 state:D stack:0 pid:8027 tgid:8027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee26dd84 r8:00000002 r7:60000113 r6:ee26dd8c r5:850ae000 r4:850ae000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850ae000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee26de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f921000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee01b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c86f8c r4:85c86c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c86f8c r4:85979280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ae000 r8:859792ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979280 r8:8027ed34 r7:ee25de60 r6:85979300 r5:850ae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee26dfb0 to 0xee26dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859158c0 INFO: task kworker/1:831:8027 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a3aa3000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:832:8032 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:832 state:D stack:0 pid:8032 tgid:8032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee279d84 r8:00000002 r7:60000013 r6:ee279d8c r5:850aec00 r4:850aec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850aec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee279e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f91f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edfe7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c86b8c r4:85c86800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c86b8c r4:85979380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850aec00 r8:859793ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979380 r8:8027ed34 r7:ee26de60 r6:85979400 r5:850aec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee279fb0 to 0xee279ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915b80 INFO: task kworker/1:832:8032 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a4370000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:833:8034 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:833 state:D stack:0 pid:8034 tgid:8034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee27dd84 r8:00000002 r7:60000013 r6:ee27dd8c r5:8507ec00 r4:8507ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8507ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee27de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f923000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee02f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8738c r4:85c87000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8738c r4:85979480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507ec00 r8:859794ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979480 r8:8027ed34 r7:ee26de60 r6:85979500 r5:8507ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee27dfb0 to 0xee27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915e40 INFO: task kworker/1:833:8034 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a4a8c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:834:8036 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:834 state:D stack:0 pid:8036 tgid:8036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee249d84 r8:00000002 r7:60000013 r6:ee249d8c r5:85ccb000 r4:85ccb000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ccb000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee249e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ccb000 r7:00000000 r6:83018200 r5:00001000 r4:7f925000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee045000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8778c r4:85c87400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8778c r4:85979580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ccb000 r8:859795ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979580 r8:8027ed34 r7:ee27de60 r6:85965980 r5:85ccb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee249fb0 to 0xee249ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85915a00 INFO: task kworker/1:834:8036 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a4a8c000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:835:8038 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:835 state:D stack:0 pid:8038 tgid:8038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee271d84 r8:00000002 r7:60000013 r6:ee271d8c r5:85ccd400 r4:85ccd400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ccd400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee271e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ccd400 r7:00000000 r6:83018200 r5:00001000 r4:7f927000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee055000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c87b8c r4:85c87800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c87b8c r4:85979600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ccd400 r8:8597962c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979600 r8:8027ed34 r7:ee249e60 r6:85965a00 r5:85ccd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee271fb0 to 0xee271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918080 INFO: task kworker/1:835:8038 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a4ccd000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:836:8040 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:836 state:D stack:0 pid:8040 tgid:8040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee285d84 r8:00000002 r7:60000013 r6:ee285d8c r5:85cce000 r4:85cce000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cce000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee285e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cce000 r7:00000000 r6:83018200 r5:00001000 r4:7f92b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee093000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c87f8c r4:85c87c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c87f8c r4:85979680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cce000 r8:859796ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979680 r8:8027ed34 r7:ee271e60 r6:85965a80 r5:85cce000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee285fb0 to 0xee285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918100 INFO: task kworker/1:836:8040 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a4ccd000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:837:8043 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:837 state:D stack:0 pid:8043 tgid:8043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee275d84 r8:00000002 r7:60000113 r6:ee275d8c r5:85ccec00 r4:85ccec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ccec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee275e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ccec00 r7:00000000 r6:83018200 r5:00001000 r4:7f92d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8c38c r4:85c8c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8c38c r4:85979700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ccec00 r8:8597972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979700 r8:8027ed34 r7:ee285e60 r6:85965b00 r5:85ccec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee275fb0 to 0xee275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859182c0 INFO: task kworker/1:837:8043 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a5795000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:838:8045 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:838 state:D stack:0 pid:8045 tgid:8045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee28dd84 r8:00000002 r7:60000013 r6:ee28dd8c r5:85ccc800 r4:85ccc800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ccc800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee28de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ccc800 r7:00000000 r6:83018200 r5:00001000 r4:7f92f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee289000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8c78c r4:85c8c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8c78c r4:85979780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ccc800 r8:859797ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979780 r8:8027ed34 r7:ee275e60 r6:85965b80 r5:85ccc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee28dfb0 to 0xee28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918280 INFO: task kworker/1:838:8045 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a5bc7000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:839:8047 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:839 state:D stack:0 pid:8047 tgid:8047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee295d84 r8:00000002 r7:60000113 r6:ee295d8c r5:85cca400 r4:85cca400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cca400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee295e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cca400 r7:00000000 r6:83018200 r5:00001000 r4:7f935000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8d38c r4:85c8d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8d38c r4:85979800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cca400 r8:8597982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979800 r8:8027ed34 r7:ee28de60 r6:85965c00 r5:85cca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee295fb0 to 0xee295ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859185c0 INFO: task kworker/1:839:8047 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a5fe9000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:840:8049 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:840 state:D stack:0 pid:8049 tgid:8049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2a1d84 r8:00000002 r7:60000113 r6:ee2a1d8c r5:8588b000 r4:8588b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8588b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2a1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859186c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8588b000 r7:00000000 r6:83018200 r5:00001000 r4:7f931000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee297000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8cb8c r4:85c8c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8cb8c r4:85979880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8588b000 r8:859798ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979880 r8:8027ed34 r7:ee295e60 r6:85965c80 r5:8588b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2a1fb0 to 0xee2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918600 INFO: task kworker/1:840:8049 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a6650000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:841:8051 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:841 state:D stack:0 pid:8051 tgid:8051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2a9d84 r8:00000002 r7:60000113 r6:ee2a9d8c r5:84528000 r4:84528000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84528000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2a9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84528000 r7:00000000 r6:83018200 r5:00001000 r4:7f933000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee29d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8cf8c r4:85c8cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8cf8c r4:85979900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84528000 r8:8597992c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979900 r8:8027ed34 r7:ee295e60 r6:85965d00 r5:84528000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2a9fb0 to 0xee2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918840 INFO: task kworker/1:841:8051 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a6650000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:842:8053 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:842 state:D stack:0 pid:8053 tgid:8053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2b5d84 r8:00000002 r7:60000013 r6:ee2b5d8c r5:84528c00 r4:84528c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84528c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2b5e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84528c00 r7:00000000 r6:83018200 r5:00001000 r4:7f937000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2b1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8d78c r4:85c8d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8d78c r4:85979980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84528c00 r8:859799ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979980 r8:8027ed34 r7:ee295e60 r6:85965d80 r5:84528c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2b5fb0 to 0xee2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918880 INFO: task kworker/1:842:8053 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a6b15000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:843:8055 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:843 state:D stack:0 pid:8055 tgid:8055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2c9d84 r8:00000002 r7:60000113 r6:ee2c9d8c r5:8452a400 r4:8452a400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452a400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2c9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452a400 r7:00000000 r6:83018200 r5:00001000 r4:7f93b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2c5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8df8c r4:85c8dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8df8c r4:85979a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452a400 r8:85979a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979a00 r8:8027ed34 r7:ee2b5e60 r6:85965e00 r5:8452a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2c9fb0 to 0xee2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918ac0 INFO: task kworker/1:843:8055 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a6b15000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:844:8058 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:844 state:D stack:0 pid:8058 tgid:8058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2d9d84 r8:00000002 r7:60000113 r6:ee2d9d8c r5:84529800 r4:84529800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84529800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2d9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84529800 r7:00000000 r6:83018200 r5:00001000 r4:7f939000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2bf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8db8c r4:85c8d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8db8c r4:85979a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84529800 r8:85979aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979a80 r8:8027ed34 r7:ee2c9e60 r6:85965e80 r5:84529800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2d9fb0 to 0xee2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918dc0 INFO: task kworker/1:844:8058 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a71b1000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:845:8059 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:845 state:D stack:0 pid:8059 tgid:8059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2ddd84 r8:00000002 r7:60000113 r6:ee2ddd8c r5:8452c800 r4:8452c800 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452c800 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2dde08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab47c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452c800 r7:00000000 r6:83018200 r5:00001000 r4:7f901000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee243000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ce538c r4:85ce5000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ce538c r4:85979b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452c800 r8:85979b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979b00 r8:8027ed34 r7:ee2c9e60 r6:85965f00 r5:8452c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2ddfb0 to 0xee2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918dc0 INFO: task kworker/1:845:8059 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a71b1000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:846:8060 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:846 state:D stack:0 pid:8060 tgid:8060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2e1d84 r8:00000002 r7:60000113 r6:ee2e1d8c r5:8452d400 r4:8452d400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452d400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2e1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452d400 r7:00000000 r6:83018200 r5:00001000 r4:7f93d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2e3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8e38c r4:85c8e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8e38c r4:85979b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452d400 r8:85979bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979b80 r8:8027ed34 r7:ee2dde60 r6:85965f80 r5:8452d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2e1fb0 to 0xee2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85918dc0 INFO: task kworker/1:846:8060 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a767a000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:847:8063 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:847 state:D stack:0 pid:8063 tgid:8063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee2f9d84 r8:00000002 r7:60000113 r6:ee2f9d8c r5:8452bc00 r4:8452bc00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452bc00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2f9e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab4040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f93f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2e9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8e78c r4:85c8e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8e78c r4:85979c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452bc00 r8:85979c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979c00 r8:8027ed34 r7:ee2dde60 r6:85ac0000 r5:8452bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2f9fb0 to 0xee2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab40c0 INFO: task kworker/1:847:8063 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a767a000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:848:8065 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:848 state:D stack:0 pid:8065 tgid:8065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee309d84 r8:00000002 r7:60000113 r6:ee309d8c r5:8452b000 r4:8452b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee309e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab41c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452b000 r7:00000000 r6:83018200 r5:00001000 r4:7f941000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2fb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8eb8c r4:85c8e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8eb8c r4:85979c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452b000 r8:85979cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979c80 r8:8027ed34 r7:ee2dde60 r6:85ac0080 r5:8452b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee309fb0 to 0xee309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab40c0 INFO: task kworker/1:848:8065 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a7b4d000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:849:8066 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:849 state:D stack:0 pid:8066 tgid:8066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee311d84 r8:00000002 r7:60000113 r6:ee311d8c r5:8452e000 r4:8452e000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452e000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee311e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab42c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452e000 r7:00000000 r6:83018200 r5:00001000 r4:7f943000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee301000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8ef8c r4:85c8ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8ef8c r4:85979d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452e000 r8:85979d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979d00 r8:8027ed34 r7:ee2dde60 r6:85ac0100 r5:8452e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee311fb0 to 0xee311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab4400 INFO: task kworker/1:849:8066 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a7b4d000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:850:8068 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:850 state:D stack:0 pid:8068 tgid:8068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee319d84 r8:00000002 r7:60000113 r6:ee319d8c r5:85cf0c00 r4:85cf0c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf0c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee319e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab4480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f945000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee31b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8f38c r4:85c8f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8f38c r4:85979d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf0c00 r8:85979dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979d80 r8:8027ed34 r7:ee2dde60 r6:85ac0180 r5:85cf0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee319fb0 to 0xee319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab4240 INFO: task kworker/1:850:8068 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a8690000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:851:8070 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:851 state:D stack:0 pid:8070 tgid:8070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee329d84 r8:00000002 r7:60000013 r6:ee329d8c r5:85cf2400 r4:85cf2400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf2400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee329e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab4540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf2400 r7:00000000 r6:83018200 r5:00001000 r4:7f947000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee321000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8f78c r4:85c8f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8f78c r4:85979e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf2400 r8:85979e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979e00 r8:8027ed34 r7:ee2dde60 r6:85ac0200 r5:85cf2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee329fb0 to 0xee329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab4440 INFO: task kworker/1:851:8070 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a8690000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:852:8073 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:852 state:D stack:0 pid:8073 tgid:8073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee341d84 r8:00000002 r7:60000113 r6:ee341d8c r5:85cf3c00 r4:85cf3c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf3c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee341e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab46c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f949000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee333000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8fb8c r4:85c8f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8fb8c r4:85979e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf3c00 r8:85979eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979e80 r8:8027ed34 r7:ee2dde60 r6:85ac0280 r5:85cf3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee341fb0 to 0xee341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab4580 INFO: task kworker/1:852:8073 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a8c04000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:853:8103 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:853 state:D stack:0 pid:8103 tgid:8103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee281d84 r8:00000002 r7:60000013 r6:ee281d8c r5:85cf5400 r4:85cf5400 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf5400 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee281e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f4040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf5400 r7:00000000 r6:83018200 r5:00001000 r4:7f903000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee373000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8ff8c r4:85c8fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c8ff8c r4:85979f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf5400 r8:85979f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979f00 r8:8027ed34 r7:ee2dde60 r6:85ac0300 r5:85cf5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee281fb0 to 0xee281ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85ab4580 INFO: task kworker/1:853:8103 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a8c04000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:854:8105 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:854 state:D stack:0 pid:8105 tgid:8105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee37dd84 r8:00000002 r7:60000113 r6:ee37dd8c r5:85cf3000 r4:85cf3000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf3000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee37de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f4840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf3000 r7:00000000 r6:83018200 r5:00001000 r4:7f951000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf89000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d3038c r4:85d30000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d3038c r4:85979f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf3000 r8:85979fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85979f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85979f80 r8:8027ed34 r7:ee281e60 r6:85ac0380 r5:85cf3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee37dfb0 to 0xee37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f4080 INFO: task kworker/1:854:8105 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a91bc000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:855:8149 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:855 state:D stack:0 pid:8149 tgid:8149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee33dd84 r8:00000002 r7:60000113 r6:ee33dd8c r5:85cf6000 r4:85cf6000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf6000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee33de08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598b040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf6000 r7:00000000 r6:83018200 r5:00001000 r4:7faa5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee6d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d96b8c r4:85d96800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d96b8c r4:85cb4000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf6000 r8:85cb402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85cb4000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cb4000 r8:8027ed34 r7:ee37de60 r6:85ac0400 r5:85cf6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee33dfb0 to 0xee33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f4f40 INFO: task kworker/1:855:8149 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a91bc000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:856:8327 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:856 state:D stack:0 pid:8327 tgid:8327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee4b1d84 r8:00000002 r7:60000013 r6:ee4b1d8c r5:85cf0000 r4:85cf0000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf0000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee4b1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dcfb00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf0000 r7:00000000 r6:83018200 r5:00001000 r4:7fb0d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee525000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d3138c r4:85d31000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d3138c r4:85cb4080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf0000 r8:85cb40ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85cb4080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cb4080 r8:8027ed34 r7:ee33de60 r6:85ac0480 r5:85cf0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee4b1fb0 to 0xee4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8598b480 INFO: task kworker/1:856:8327 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a91bc000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:857:8383 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:857 state:D stack:0 pid:8383 tgid:8383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee791d84 r8:00000002 r7:60000113 r6:ee791d8c r5:85cf6c00 r4:85cf6c00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85cf6c00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee791e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dcf980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85cf6c00 r7:00000000 r6:83018200 r5:00001000 r4:7fb0f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee535000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d3178c r4:85d31400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d3178c r4:85cb4100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85cf6c00 r8:85cb412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85cb4100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cb4100 r8:8027ed34 r7:ee4b1e60 r6:85ac0500 r5:85cf6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee791fb0 to 0xee791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85dcfd00 INFO: task kworker/1:857:8383 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a9873000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:858:8384 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:858 state:D stack:0 pid:8384 tgid:8384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee795d84 r8:00000002 r7:60000113 r6:ee795d8c r5:8452ec00 r4:8452ec00 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8452ec00 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee795e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dcf2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8452ec00 r7:00000000 r6:83018200 r5:00001000 r4:7fb23000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee703000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d31b8c r4:85d31800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85d31b8c r4:85cb4180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8452ec00 r8:85cb41ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85cb4180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cb4180 r8:8027ed34 r7:ee791e60 r6:85ac0580 r5:8452ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee795fb0 to 0xee795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85dcf8c0 INFO: task kworker/1:858:8384 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a9f2e000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:859:8385 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:859 state:D stack:0 pid:8385 tgid:8385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a60c20>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a5fc98>] (__schedule) from [<81a60c20>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ee4f1d84 r8:00000002 r7:60000113 r6:ee4f1d8c r5:8507b000 r4:8507b000 [<81a60bf4>] (schedule) from [<81a61008>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8507b000 r4:829187f0 [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a60ff0>] (schedule_preempt_disabled) from [<81a636ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a633ec>] (__mutex_lock.constprop.0) from [<81a63bb8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee4f1e08 r4:00000000 [<81a63ba4>] (__mutex_lock_slowpath) from [<81a63bf8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a63bbc>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85df0640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507b000 r7:00000000 r6:83018200 r5:00001000 r4:7fb11000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee54d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85da438c r4:85da4000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85da438c r4:85cb4200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507b000 r8:85cb422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85cb4200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cb4200 r8:8027ed34 r7:ee795e60 r6:85cb4280 r5:8507b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee4f1fb0 to 0xee4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85dcf8c0 INFO: task kworker/1:859:8385 is blocked on a mutex likely owned by task kworker/0:421:4512. task:kworker/0:421 state:R running task stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5fc98>] (__schedule) from [<81a61054>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:851a3c00 r8:80200be4 r7:eaf0dd54 r6:ffffffff r5:851a3c00 r4:00000000 [<81a61014>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaf0dd20 to 0xeaf0dd68) dd20: a9f2e000 eaefd000 00000001 80239bb8 7f3dd000 00000001 82ac11c4 82ac05a0 dd40: 7f3dd000 eaefd000 8280c9b4 eaf0dd9c eaf0dda0 eaf0dd70 80230af4 80239bd0 dd60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf0ddc0 r5:eaf0de08 r4:eaf0ddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84879f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:84879f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84879f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84879f00 r8:8027ed34 r7:eaed5e60 r6:8497d480 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847915c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000f0013 r5:600f0093 r4:8225e9d4 [<80201ae4>] (show_stack) from [<8021fdc4>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ae4>] (show_stack) from [<8021fdc4>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fd54>] (dump_stack_lvl) from [<8021fde8>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021fdd0>] (dump_stack) from [<81a49bb8>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a49a58>] (nmi_cpu_backtrace) from [<81a49d04>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c690 r5:8281afc0 r4:ffffffff [<81a49bd4>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8280c80c r8:82ab5564 r7:8281bba8 r6:000077e4 r5:8281b588 r4:85d4820c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380b44>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380b44>] (check_hung_uninterruptible_tasks kernel/hung_task.c:307 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380b44>] (watchdog+0x4a8/0x74c kernel/hung_task.c:470) [<8038069c>] (watchdog) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8038069c r7:83349780 r6:83349780 r5:83259800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8334c580 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2815 Comm: pr/ttyAMA0 Not tainted 6.15.0-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a69194>] lr : [<80a6c958>] psr: 60070113 sp : ebea1eb0 ip : ebea1ec0 fp : ebea1ebc r10: 8295a64c r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 8295a5b0 r5 : 00000000 r4 : 00000001 r3 : 0000e877 r2 : 00000000 r1 : 60070113 r0 : 84499040 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 846d0bc0 DAC: 00000000 Call trace: [<81a6916c>] (_raw_spin_unlock_irqrestore) from [<80a6c958>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6916c>] (_raw_spin_unlock_irqrestore) from [<80a6c958>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a6916c>] (_raw_spin_unlock_irqrestore) from [<80a6c958>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a6c938>] (pl011_console_device_unlock) from [<802e7e6c>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802e7dec>] (nbcon_emit_one) from [<802e808c>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c690 r5:83ae0000 r4:8295a5b0 [<802e7ee4>] (nbcon_kthread_func) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295a5b0 r8:802e7ee4 r7:83971800 r6:83971800 r5:83ae0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebea1fb0 to 0xebea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8389cd00